Abstract
Vehicular Ad-hoc Network (VANET) is a special case of an Ad hoc mobile network formed by vehicles communicating directly with each other or via a wireless infrastructure called the Road Side Unit (RSU). Like all similar networks, VANET is more concerned with Sybil attacks where a malicious attacking node sends messages with multiple identities to other nodes in the network. Thus, causing a general malfunction of the network, which gives the illusion of a problem of traffic like traffic jam or a virtual accident. So, honest vehicles change their path or leave the road for the benefit of ‘attacker’. In this paper, we present an effective solution against this severe threat by using a distributed and collaborative technique between RSUs allowing the detection of Sybil vehicles based on their real positions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Crainic, T.G., Gendreau, M., Potvin, J.Y.: Intelligent freight-transportation systems: assessment and the contribution of operations research. Transp. Res. Part C: Emerg. Technol. 17(6), 541–557 (2009)
Cunha, F., et al.: Data communication in VANETs: protocols, applications and challenges. Ad Hoc Netw. 44, 90–103 (2016)
Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45748-8_24
Mishra, A.: Security and Quality of Service in Ad Hoc Wireless Networks (chaps. 1, 3) (2008). ISBN 13 978-0-521-87824-1 Handbook
Sakiz, F., Sen, S.: A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Netw. 61, 33–50 (2017)
Manvi, S.S., Tangade, S.: A survey on authentication schemes in VANETs for secured communication. Veh. Commun. 9, 19–30 (2017)
Isaac, J.T., Zeadally, S., Camara, J.S.: Security attacks and solutions for vehicular ad hoc networks. Commun. IET 4(7), 894–903 (2010)
Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in VANETs. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, VANET 2004, Philadelphia, PA, USA, pp. 29–37. ACM (2004)
Lee, B., Jeong, E., Jung, I.: A DTSA (detection technique against a Sybil attack) protocol using SKC (session key based certificate) on VANET. Int. J. Secur. Appl. 7(3), 1–10 (2013)
Xiao, B., Yu, B., Gao, C.: Detection and localization of Sybil nodes in VANETs. In: Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, DIWANS 2006, Los Angeles, CA, USA, pp. 1–8. ACM (2006)
Zhou, T., Choudhury, R.R., Ning, P., Chakrabarty, K.: P2DAP-Sybil attacks detection in vehicular ad hoc networks. IEEE J. Sel. Areas Commun. 29(3), 582–594 (2011)
Yu, B., Xu, C.Z., Xiao, B.: Detecting Sybil attacks in VANETs. J. Parallel Distrib. Comput. 73(6), 746–756 (2013)
Feng, X., Li, C., Chen, D., Tang, J.: A method for defensing against multi-source Sybil attacks in VANET. Peer-to-Peer Netw. Appl. 10(2), 305–314 (2017)
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, IPSN 2004, pp. 259–268. ACM, New York (2004)
Friis, H.T.: A note on a simple transmission formula. Proc. IRE 34, 254–256 (1946)
Bellifemine, F., Poggi, A., Rimassa, G.: Developing multi-agent systems with a FIPA-compliant agent framework. Softw. Pract. Exp. 31, 103–128 (2001)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Benkirane, S. (2019). Road Safety Against Sybil Attacks Based on RSU Collaboration in VANET Environment. In: Renault, É., Boumerdassi, S., Leghris, C., Bouzefrane, S. (eds) Mobile, Secure, and Programmable Networking. MSPN 2019. Lecture Notes in Computer Science(), vol 11557. Springer, Cham. https://doi.org/10.1007/978-3-030-22885-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-22885-9_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22884-2
Online ISBN: 978-3-030-22885-9
eBook Packages: Computer ScienceComputer Science (R0)