Skip to main content
Top
Published in: Wireless Personal Communications 3/2022

30-10-2021

Detecting Sybil Attack in Vehicular Ad-hoc Networks (Vanets) by Using Fitness Function, Signal Strength Index and Throughput

Authors: Seyed Salar Sefati, Sara Ghiasi Tabrizi

Published in: Wireless Personal Communications | Issue 3/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Ad-hoc networks are vehicular networks whose functions are widely expanding. High dynamicity and the presence of wireless communications are two major challenging features of these networks. Due to, security and protection of these networks have remained as big unresolved challenges. Attack detection in Vanets may have significant impact on the efficiency of these networks. Timely detection of attacks helps prevent road casualties and traffic control. Initial identification is done by the neighboring nodes. When each node receives a message from neighboring nodes, it compares the ID of each node’s with those of other nodes’ messages. If the messages are the same but sent from different nodes, neighboring nodes send a sample of the data to the RSU. If RSU doubts to an ID, it establishes a table of parameters, such a delay, packet drop and throughput. The total sum of fitness function should be equal to one. If the fitness function of these parameters is beyond the determined limit, nodes will continue to work. In this paper detected Sybil attacks used by the NS3 simulator. The results of the proposed method were acceptable in comparison with PDF (probability density function), FCVS (Fuzzy-based collaborative verification system) and Heartbeat scheme. Delay, energy and strength were the parameters, which had higher responsiveness.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Alheeti, K. M.A., Gruebler, A., McDonald-Maier, K. D. (2015). An intrusion detection system against malicious attacks on the communication network of driverless cars. In 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), IEEE, pp. 916–921. Alheeti, K. M.A., Gruebler, A., McDonald-Maier, K. D. (2015). An intrusion detection system against malicious attacks on the communication network of driverless cars. In 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), IEEE, pp. 916–921.
2.
go back to reference Alheeti, K. M. A. Gruebler, A., McDonald-Maier, K. D., Fernando, A. Prediction of DoS attacks in external communication for self-driving vehicles using a fuzzy petri net model. In 2016 IEEE International Conference on Consumer Electronics (ICCE), IEEE, pp. 502–503. Alheeti, K. M. A. Gruebler, A., McDonald-Maier, K. D., Fernando, A. Prediction of DoS attacks in external communication for self-driving vehicles using a fuzzy petri net model. In 2016 IEEE International Conference on Consumer Electronics (ICCE), IEEE, pp. 502–503.
3.
go back to reference Bian, C., Zhao, T., Li, X., & Yan, W. (2015). Boosting named data networking for data dissemination in urban VANET scenarios. Vehicular Communications, 2(4), 195–207.CrossRef Bian, C., Zhao, T., Li, X., & Yan, W. (2015). Boosting named data networking for data dissemination in urban VANET scenarios. Vehicular Communications, 2(4), 195–207.CrossRef
4.
go back to reference Faisal, S. M., & Zaidi, T. (2020). Timestamp Based Detection of Sybil Attack in VANET. Int. J. Netw. Secur., 22(3), 397–408. Faisal, S. M., & Zaidi, T. (2020). Timestamp Based Detection of Sybil Attack in VANET. Int. J. Netw. Secur., 22(3), 397–408.
5.
go back to reference Cheng, J., Cheng, J., Zhou, M., Liu, F., Gao, S., & Liu, C. (2015). Routing in internet of vehicles: A review. IEEE Transactions on Intelligent Transportation Systems, 16(5), 2339–2352.CrossRef Cheng, J., Cheng, J., Zhou, M., Liu, F., Gao, S., & Liu, C. (2015). Routing in internet of vehicles: A review. IEEE Transactions on Intelligent Transportation Systems, 16(5), 2339–2352.CrossRef
6.
go back to reference Yao, Y., et al. (2017). Voiceprint: A novel Sybil attack detection method based on RSSI for VANETs. In 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),: IEEE, pp. 591–602. Yao, Y., et al. (2017). Voiceprint: A novel Sybil attack detection method based on RSSI for VANETs. In 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),: IEEE, pp. 591–602.
8.
go back to reference Pukale, P., & Gupta, P. (2013). Analysis of end-to-end delay in vehicular networks. International Journal of Science Research, 5, 1122–1125. Pukale, P., & Gupta, P. (2013). Analysis of end-to-end delay in vehicular networks. International Journal of Science Research, 5, 1122–1125.
9.
go back to reference Walters, J. P., Liang, Z., Shi, W., Chaudhary, V. (2007). Wireless sensor network security: A survey. In Security in distributed, grid, mobile, and pervasive computing: Auerbach Publications, pp. 367–409. Walters, J. P., Liang, Z., Shi, W., Chaudhary, V. (2007). Wireless sensor network security: A survey. In Security in distributed, grid, mobile, and pervasive computing: Auerbach Publications, pp. 367–409.
10.
go back to reference Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536–550.CrossRef Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536–550.CrossRef
11.
go back to reference Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys & Tutorials, 15(4), 2046–2069.CrossRef Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys & Tutorials, 15(4), 2046–2069.CrossRef
12.
go back to reference Boukerche, A., Oliveira, H. A., Nakamura, E. F., & Loureiro, A. A. (2008). Vehicular ad hoc networks: A new challenge for localization-based systems. Computer communications, 31(12), 2838–2849.CrossRef Boukerche, A., Oliveira, H. A., Nakamura, E. F., & Loureiro, A. A. (2008). Vehicular ad hoc networks: A new challenge for localization-based systems. Computer communications, 31(12), 2838–2849.CrossRef
13.
go back to reference Sarigiannidis, P., Karapistoli, E., & Economides, A. A. (2015). "Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information. Expert Systems with Applications, 42(21), 7560–7572.CrossRef Sarigiannidis, P., Karapistoli, E., & Economides, A. A. (2015). "Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information. Expert Systems with Applications, 42(21), 7560–7572.CrossRef
14.
go back to reference Ogonji, M. M., Okeyo, G., & Wafula, J. M. (2020). A survey on privacy and security of Internet of Things. Computer Science Review, 38, 100312.MathSciNetCrossRef Ogonji, M. M., Okeyo, G., & Wafula, J. M. (2020). A survey on privacy and security of Internet of Things. Computer Science Review, 38, 100312.MathSciNetCrossRef
15.
go back to reference Sefati, S. S., & Tabrizi, S. G. (2021). Cluster head selection and routing protocol for wireless sensor networks (WSNs) based on software-defined network (SDN) via game of theory. Journal of Electrical and Electronic Engineering, 9(4), 100–115.CrossRef Sefati, S. S., & Tabrizi, S. G. (2021). Cluster head selection and routing protocol for wireless sensor networks (WSNs) based on software-defined network (SDN) via game of theory. Journal of Electrical and Electronic Engineering, 9(4), 100–115.CrossRef
16.
go back to reference Park, P., Di Marco, P., Nah, J., & Fischione, C. (2020). Wireless avionics intracommunications: A survey of benefits, challenges, and solutions. IEEE Internet of Things Journal, 8(10), 7745–7767.CrossRef Park, P., Di Marco, P., Nah, J., & Fischione, C. (2020). Wireless avionics intracommunications: A survey of benefits, challenges, and solutions. IEEE Internet of Things Journal, 8(10), 7745–7767.CrossRef
18.
go back to reference Sengan, S., Subramaniyaswamy, V., Nair, S. K., Indragandhi, V., Manikandan, J., & Ravi, L. (2020). Enhancing cyber–physical systems with hybrid smart city cyber security architecture for secure public data-smart network. Future Generation Computer Systems, 112, 724–737.CrossRef Sengan, S., Subramaniyaswamy, V., Nair, S. K., Indragandhi, V., Manikandan, J., & Ravi, L. (2020). Enhancing cyber–physical systems with hybrid smart city cyber security architecture for secure public data-smart network. Future Generation Computer Systems, 112, 724–737.CrossRef
19.
go back to reference Verma, K., Hasbullah, H., & Kumar, A. (2013). Prevention of DoS attacks in VANET. Wireless personal communications, 73(1), 95–126.CrossRef Verma, K., Hasbullah, H., & Kumar, A. (2013). Prevention of DoS attacks in VANET. Wireless personal communications, 73(1), 95–126.CrossRef
20.
go back to reference Iwendi, C., Uddin, M., Ansere, J. A., Nkurunziza, P., Anajemba, J. H., & Bashir, A. K. (2018). On detection of Sybil attack in large-scale VANETs using spider-monkey technique. IEEE Access, 6, 47258–47267.CrossRef Iwendi, C., Uddin, M., Ansere, J. A., Nkurunziza, P., Anajemba, J. H., & Bashir, A. K. (2018). On detection of Sybil attack in large-scale VANETs using spider-monkey technique. IEEE Access, 6, 47258–47267.CrossRef
21.
go back to reference Yu, B., Xu, C.-Z., & Xiao, B. (2013). Detecting sybil attacks in VANETs. Journal of Parallel and Distributed Computing, 73(6), 746–756.CrossRef Yu, B., Xu, C.-Z., & Xiao, B. (2013). Detecting sybil attacks in VANETs. Journal of Parallel and Distributed Computing, 73(6), 746–756.CrossRef
22.
go back to reference Chen, C.-L., Chang, C., Chang, C.-H., & Wang, Y.-F. (2013). A secure ambulance communication protocol for VANET. Wireless personal communications, 73(3), 1187–1213.CrossRef Chen, C.-L., Chang, C., Chang, C.-H., & Wang, Y.-F. (2013). A secure ambulance communication protocol for VANET. Wireless personal communications, 73(3), 1187–1213.CrossRef
23.
go back to reference Fogue, M., et al. (2014). Securing warning message dissemination in VANETs using cooperative neighbor position verification. IEEE Transactions on Vehicular Technology, 64(6), 2538–2550.CrossRef Fogue, M., et al. (2014). Securing warning message dissemination in VANETs using cooperative neighbor position verification. IEEE Transactions on Vehicular Technology, 64(6), 2538–2550.CrossRef
24.
go back to reference Jamshidi, M., Zangeneh, E., Esnaashari, M., Darwesh, A. M., & Meybodi, M. R. (2019). A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it. Wireless Personal Communications, 105(1), 145–173.CrossRef Jamshidi, M., Zangeneh, E., Esnaashari, M., Darwesh, A. M., & Meybodi, M. R. (2019). A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it. Wireless Personal Communications, 105(1), 145–173.CrossRef
25.
go back to reference Liang, J., Chen, J., Zhu, Y., & Yu, R. (2019). A novel Intrusion Detection System for Vehicular Ad Hoc Networks (VANETs) based on differences of traffic flow and position. Applied Soft Computing, 75, 712–727.CrossRef Liang, J., Chen, J., Zhu, Y., & Yu, R. (2019). A novel Intrusion Detection System for Vehicular Ad Hoc Networks (VANETs) based on differences of traffic flow and position. Applied Soft Computing, 75, 712–727.CrossRef
26.
go back to reference Cunha, F., et al. (2016). Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Networks, 44, 90–103.CrossRef Cunha, F., et al. (2016). Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Networks, 44, 90–103.CrossRef
28.
go back to reference Liu, J., Yang, W., Zhang, J., & Yang, C. (2020). Detecting false messages in vehicular ad hoc networks based on a traffic flow model. International Journal of Distributed Sensor Networks, 16(2), 1550147720906390.CrossRef Liu, J., Yang, W., Zhang, J., & Yang, C. (2020). Detecting false messages in vehicular ad hoc networks based on a traffic flow model. International Journal of Distributed Sensor Networks, 16(2), 1550147720906390.CrossRef
29.
go back to reference Rajadurai, H., & Gandhi, U. D. (2020). Fuzzy based collaborative verification system for Sybil attack detection in MANET. Wireless Personal Communications, 110(4), 2179–2193.CrossRef Rajadurai, H., & Gandhi, U. D. (2020). Fuzzy based collaborative verification system for Sybil attack detection in MANET. Wireless Personal Communications, 110(4), 2179–2193.CrossRef
30.
go back to reference Barnwal, R. P., Ghosh, S.K. (2012). Heartbeat message based misbehavior detection scheme for vehicular ad-hoc networks. In 2012 International Conference on Connected Vehicles and Expo (ICCVE): IEEE, pp. 29–34. Barnwal, R. P., Ghosh, S.K. (2012). Heartbeat message based misbehavior detection scheme for vehicular ad-hoc networks. In 2012 International Conference on Connected Vehicles and Expo (ICCVE): IEEE, pp. 29–34.
Metadata
Title
Detecting Sybil Attack in Vehicular Ad-hoc Networks (Vanets) by Using Fitness Function, Signal Strength Index and Throughput
Authors
Seyed Salar Sefati
Sara Ghiasi Tabrizi
Publication date
30-10-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2022
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-09261-x

Other articles of this Issue 3/2022

Wireless Personal Communications 3/2022 Go to the issue