Abstract
With the increment in human populace and financial advancement, the populace of private vehicles on the street has likewise expanded. This has brought about expanded mishap likelihood and fatalities on the streets. Vehicular Ad hoc Networks (VANETs) have indicated guarantee of cutting down street mishaps and fatalities thereof by empowering correspondence between vehicles. VANETs likewise enable the street administrators to control and screen vehicles for rash driving and snappy help. Be that as it may, these systems face difficulties of Design, Routing, Communication, and Security. Utilization of remote vehicle for correspondence has left these systems powerless against various sort of security assaults. One of the significant helplessness in such systems is caused when a malignant vehicle or RSU can gain different characters. The assault is named as Sybil Attack. In VANETs, a noxious vehicle may send wrong messages identified with traffic, mishap ahead, street shut, and so on. This may compel the engine driver to take an alternate course, hence making him inclined to an untoward occurrence. In this paper, we have used different methodologies like PKC, PVM, and RTM techniques to detect Sybil attack in VANET.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and counter measures. Ad hoc Netw. J. (Elsevier) 1, 293–315 (2003)
Sood, M., Vasudeva, A.: Perspectives of Sybil attack in routing protocols of mobile ad hoc network. Comput. Netw. Commun. (NetCom) 131, 3–13 (2013)
Ali Akbar Pouyan, Mahdiyeh Alimohammadi, “Sybil Attack Detection in Vehicular Networks”, Computer Science and Information Technology 2(4): 197–202, 2014
Yu, B., Xu, C.Z., Xiao, B.: Detecting Sybil attacks in VANETs. J. Parallel Distrib. Comput. (Elsevier) (9 February, 2013)
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis and defenses. In: Third International Symposium on Information Processing in Sensor Networks, pp. 259–268. IPSN 2004 (2004)
Hubaux, J.P., Capkun, S., Luo, J.: The security and privacy of smart vehicles. IEEE Secur. Privacy Mag. 2(3), 49–55 (2004)
Douceur, J.R.: The Sybil attack. In: Proceedings of the International Workshop on Peer to Peer Systems, pp. 251–260 (March 2002)
Grover, J., Gaur, M.S.: Sybil attack in VANETs detection and prevention. Secur. self-organ. Netw. Printed in the United States of America on acid-free paper-10 9 8 7 6 5 4 3 2 1 (2011)
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis and defenses. In: Proceedings of International Symposium on Information Processing in Sensor Networks, pp. 259–268 (April 2004)
Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 39–68 (April 2007)
Khalili, A., Katz, J., Arbaugh, W.A.: Towards secure key distribution in truly ad-hoc networks. In: Proceedings of IEEE Workshop on security and Assurance in Ad-Hoc Networks (2003)
Martucci, L.A., Kohlweiss, M., Anderson, C., Panchenko, A.: Self-certified Sybil-free pseudonyms. In: WiSec’08: Proceedings of the First ACM Conference on Wireless Network Security, pp. 154–159. New York, NY, USA, ACM Press (2008)
Yan, G., Olariu, S., Weigle, M.C.: Providing VANET security through active position detection. Comput. Commun. 31(12), 2883–2897 (2008)
Isaac, T., Zeadally, S., Camara, J.S.: Security attacks and solutions for vehicular ad hoc networks. Commun. IET 4(7) (June 2010)
Samara, G., Al-Salihy, W.A., Sures, R.: Security analysis of vehicular ad hoc networks (VANET). In: IEEE Second International Conference on Network Applications, Protocols and Services (2010)
Zhou, T., Choudhury, R.R., Ning, P., Chakrabarty, K.: P2 DAP-Sybil attacks detection in vehicular ad hoc networks. IEEE J. Sel. Areas Commun. 29(3) (March 2011)
Ibrahim, K.: Data aggregation and dissemination in vehicular ad-hoc networks. Doctoral dissertation, Old Dominion University, Norfolk, Virginia (2011)
Levine, B.N., Shields, C., Margolin, N.B.: A survey of solutions to the Sybil attack. MA, University of Massachusetts, Amherst (2006)
Saini, M., Kumar, K., Bhatnager, K.V.: Efficient and feasible methods to detect Sybil attack in VANET. Int. J. Eng. Res. Technol. 6, 431–440 (2013)
Hao, Y., Tang, J., Cheng, Y.: Cooperative Sybil attack detection for position based applications in privacy preserved VANETs. In: IEEE Communications Society in the IEEE Globecom 2011 Proceedings
Pathre, A., Agrawal, C., Jain, A.: Identification of malicious vehicle in VANET environment. J. Glob. Res. Comput. Sci. 4, 30–34 (2013)
Rahbari, M., Jamali, M.A.J.: Efficient detection of Sybil attack based on cryptography in VANET. Int. J. Netw. Secur. Appl. (IJNSA) 3, 185–195 (2011)
Feng, X., Li, C., Chen, D., Tang, J.: A method for defensing against multi-source Sybil attacks in VANET. Peer-to-Peer Netw. Appl. (Springer) 10, 305–314 (2017)
Grover, J., Gaur, M.S., Laxmi, V.: Multivariate verification for Sybil attack detection in VANET. Online https://doi.org/10.1515/comp-2015-0006 (December 2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Pattanayak, B.K., Pattnaik, O., Pani, S. (2021). Dealing with Sybil Attack in VANET. In: Mishra, D., Buyya, R., Mohapatra, P., Patnaik, S. (eds) Intelligent and Cloud Computing. Smart Innovation, Systems and Technologies, vol 194. Springer, Singapore. https://doi.org/10.1007/978-981-15-5971-6_51
Download citation
DOI: https://doi.org/10.1007/978-981-15-5971-6_51
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5970-9
Online ISBN: 978-981-15-5971-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)