Abstract
Vehicular ad hoc networks (VANETs) are expected to play an important role in our lives. They will improve the traffic safety and bring about a revolution on the driving experience. However, these benefits are counterbalanced by possible attacks that threaten not only the vehicle’s security, but also passengers’ lives. One of the most common attacks is the Sybil attack, which is even more dangerous than others because it could be the starting point of many other attacks in VANETs. This paper proposes a distributed approach allowing the detection of Sybil attacks by using the traffic flow theory. The key idea here is that each vehicle will monitor its neighborhood in order to detect an eventual Sybil attack. This is achieved by a comparison between the real accurate speed of the vehicle and the one estimated using the V2V communications with vehicles in the vicinity. This estimated speed is obtained using the traffic flow fundamental diagram of the road’s portion where the vehicles are moving.
A mathematical model that evaluates the rate of Sybil attack detection according to the traffic density is proposed. Then, this model is validated through some numerical simulations conducted using MATLAB tool.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Al-Sultan, S., Al-Doori, M.M., Al-Bayatti, A.H., Zedan, H.: A comprehensive survey on vehicular Ad Hoc network. J. Netw. Comput. Appl. 31(37), 380–92 (2014)
Maxwell, J.C.: A Treatise on Electricity and Magnetism, 3rd edn, vol. 2, pp. 68–73. Clarendon, Oxford (1892)
Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis defenses. In: Proceedings of International Symposium on Information Processing in Sensor Networks, pp. 259–268 (2004)
Pal, S., Mukhopadhyay, A.K., Bhattacharya, P.P.: Defending mechanisms against sybil attack in next generation mobile ad hoc networks. IETE Tech. Rev. 25(4), 209–214 (2008)
Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. Spec. Issue Secur. Ad Hoc Sens. Netw. 15(1), 3968 (2007)
Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing vehicular communications. IEEE Wirel. Commun. Mag. Spec. Issue InterVehicular Commun. 13(5), 815 (2006)
Study on the Deployment of C-ITS in Europe: Final Report. https://ec.europa.eu/transport/sites/transport/files/2016-c-its-deployment-study-final-report.pdf
Garip, M.T., Reiher, P., Gerla, M.: Ghost: concealing vehicular botnet communication in the VANET control channel. In: 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, pp. 1–6 (2016). https://doi.org/10.1109/IWCMC.2016.7577024
Zeroual, A., Messai, N., Kechida, S., Hamdi, F.: A piecewise switched linear approach for traffic flow modeling. Int. J. Autom. Comput. 14, 729–741 (2017)
Acknowledgement
This work was made possible by EC Grant No. INEA/CEF/TRAN/A2014/1042281 from the INEA Agency for the SCOOP project. The statements made herein are solely the responsibility of the authors.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Ayaida, M., Messai, N., Najeh, S., Wilhelm, G. (2019). Cyber Attack Detection Algorithm Using Traffic Flow Theory. In: Hilt, B., Berbineau, M., Vinel, A., Jonsson, M., Pirovano, A. (eds) Communication Technologies for Vehicles. Nets4Cars/Nets4Trains/Nets4Aircraft 2019. Lecture Notes in Computer Science(), vol 11461. Springer, Cham. https://doi.org/10.1007/978-3-030-25529-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-25529-9_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-25528-2
Online ISBN: 978-3-030-25529-9
eBook Packages: Computer ScienceComputer Science (R0)