Skip to main content

Dealing with Sybil Attack in VANET

  • Conference paper
  • First Online:

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 194))

Abstract

With the increment in human populace and financial advancement, the populace of private vehicles on the street has likewise expanded. This has brought about expanded mishap likelihood and fatalities on the streets. Vehicular Ad hoc Networks (VANETs) have indicated guarantee of cutting down street mishaps and fatalities thereof by empowering correspondence between vehicles. VANETs likewise enable the street administrators to control and screen vehicles for rash driving and snappy help. Be that as it may, these systems face difficulties of Design, Routing, Communication, and Security. Utilization of remote vehicle for correspondence has left these systems powerless against various sort of security assaults. One of the significant helplessness in such systems is caused when a malignant vehicle or RSU can gain different characters. The assault is named as Sybil Attack. In VANETs, a noxious vehicle may send wrong messages identified with traffic, mishap ahead, street shut, and so on. This may compel the engine driver to take an alternate course, hence making him inclined to an untoward occurrence. In this paper, we have used different methodologies like PKC, PVM, and RTM techniques to detect Sybil attack in VANET.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and counter measures. Ad hoc Netw. J. (Elsevier) 1, 293–315 (2003)

    Article  Google Scholar 

  2. Sood, M., Vasudeva, A.: Perspectives of Sybil attack in routing protocols of mobile ad hoc network. Comput. Netw. Commun. (NetCom) 131, 3–13 (2013)

    Article  Google Scholar 

  3. Ali Akbar Pouyan, Mahdiyeh Alimohammadi, “Sybil Attack Detection in Vehicular Networks”, Computer Science and Information Technology 2(4): 197–202, 2014

    Google Scholar 

  4. Yu, B., Xu, C.Z., Xiao, B.: Detecting Sybil attacks in VANETs. J. Parallel Distrib. Comput. (Elsevier) (9 February, 2013)

    Google Scholar 

  5. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis and defenses. In: Third International Symposium on Information Processing in Sensor Networks, pp. 259–268. IPSN 2004 (2004)

    Google Scholar 

  6. http://grouper.ieee.org/groups/scc32/dsrc/index.html

  7. Hubaux, J.P., Capkun, S., Luo, J.: The security and privacy of smart vehicles. IEEE Secur. Privacy Mag. 2(3), 49–55 (2004)

    Article  Google Scholar 

  8. Douceur, J.R.: The Sybil attack. In: Proceedings of the International Workshop on Peer to Peer Systems, pp. 251–260 (March 2002)

    Google Scholar 

  9. Grover, J., Gaur, M.S.: Sybil attack in VANETs detection and prevention. Secur. self-organ. Netw. Printed in the United States of America on acid-free paper-10 9 8 7 6 5 4 3 2 1 (2011)

    Google Scholar 

  10. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis and defenses. In: Proceedings of International Symposium on Information Processing in Sensor Networks, pp. 259–268 (April 2004)

    Google Scholar 

  11. Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 39–68 (April 2007)

    Google Scholar 

  12. Khalili, A., Katz, J., Arbaugh, W.A.: Towards secure key distribution in truly ad-hoc networks. In: Proceedings of IEEE Workshop on security and Assurance in Ad-Hoc Networks (2003)

    Google Scholar 

  13. Martucci, L.A., Kohlweiss, M., Anderson, C., Panchenko, A.: Self-certified Sybil-free pseudonyms. In: WiSec’08: Proceedings of the First ACM Conference on Wireless Network Security, pp. 154–159. New York, NY, USA, ACM Press (2008)

    Google Scholar 

  14. Yan, G., Olariu, S., Weigle, M.C.: Providing VANET security through active position detection. Comput. Commun. 31(12), 2883–2897 (2008)

    Article  Google Scholar 

  15. Isaac, T., Zeadally, S., Camara, J.S.: Security attacks and solutions for vehicular ad hoc networks. Commun. IET 4(7) (June 2010)

    Google Scholar 

  16. Samara, G., Al-Salihy, W.A., Sures, R.: Security analysis of vehicular ad hoc networks (VANET). In: IEEE Second International Conference on Network Applications, Protocols and Services (2010)

    Google Scholar 

  17. Zhou, T., Choudhury, R.R., Ning, P., Chakrabarty, K.: P2 DAP-Sybil attacks detection in vehicular ad hoc networks. IEEE J. Sel. Areas Commun. 29(3) (March 2011)

    Google Scholar 

  18. Ibrahim, K.: Data aggregation and dissemination in vehicular ad-hoc networks. Doctoral dissertation, Old Dominion University, Norfolk, Virginia (2011)

    Google Scholar 

  19. Levine, B.N., Shields, C., Margolin, N.B.: A survey of solutions to the Sybil attack. MA, University of Massachusetts, Amherst (2006)

    Google Scholar 

  20. Saini, M., Kumar, K., Bhatnager, K.V.: Efficient and feasible methods to detect Sybil attack in VANET. Int. J. Eng. Res. Technol. 6, 431–440 (2013)

    Google Scholar 

  21. Hao, Y., Tang, J., Cheng, Y.: Cooperative Sybil attack detection for position based applications in privacy preserved VANETs. In: IEEE Communications Society in the IEEE Globecom 2011 Proceedings

    Google Scholar 

  22. Pathre, A., Agrawal, C., Jain, A.: Identification of malicious vehicle in VANET environment. J. Glob. Res. Comput. Sci. 4, 30–34 (2013)

    Google Scholar 

  23. Rahbari, M., Jamali, M.A.J.: Efficient detection of Sybil attack based on cryptography in VANET. Int. J. Netw. Secur. Appl. (IJNSA) 3, 185–195 (2011)

    Google Scholar 

  24. Feng, X., Li, C., Chen, D., Tang, J.: A method for defensing against multi-source Sybil attacks in VANET. Peer-to-Peer Netw. Appl. (Springer) 10, 305–314 (2017)

    Article  Google Scholar 

  25. Grover, J., Gaur, M.S., Laxmi, V.: Multivariate verification for Sybil attack detection in VANET. Online https://doi.org/10.1515/comp-2015-0006 (December 2015)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Omkar Pattnaik .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pattanayak, B.K., Pattnaik, O., Pani, S. (2021). Dealing with Sybil Attack in VANET. In: Mishra, D., Buyya, R., Mohapatra, P., Patnaik, S. (eds) Intelligent and Cloud Computing. Smart Innovation, Systems and Technologies, vol 194. Springer, Singapore. https://doi.org/10.1007/978-981-15-5971-6_51

Download citation

Publish with us

Policies and ethics