Skip to main content

Advertisement

Log in

Sybil Attack with RSU Detection and Location Privacy in Urban VANETs: An Efficient EPORP Technique

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In recent years, Vehicular ad hoc networks (VANETs) could facilitate the decision-making progress of the drivers for example trip planning with the consideration of traffic. In the VANET, the Sybil attack is a very serious attack that collapses the security. In literature, some of the methods are reviewed to detect Sybil attacks in VANETs, but it fails to achieve Sybil attack detection. Hence, in this paper, Emperor Penguin Optimization-based Routing protocol (EPORP) is developed for detecting the Sybil attack which enhances the VANETs security. The main motive of the research is detecting the Sybil attack in VANETs for enhancing the secure operation. In the proposed approach, the Sybil attack will be detected with the help of the Rumour riding technique. To enhance the security of the VANETs, the Split XOR (SXOR) operation is utilized. In the SXOR operation, the optimal key is selected with the help of Emperor Penguin Optimization (EPO). The proposed method is implemented in the NS2 platform and performances are evaluated by metrics such as delay, throughput, delay, encryption time, and decryption time. The proposed method is compared with existing methods such as Whale Optimization Algorithm (WOA), Particle Swarm Optimization (PSO), and Firefly Algorithm (FA) respectively. While analyzing the delivery ratio, the proposed method has 0.96 s, and the WOA, PSO, and FA are 0.94, 0.92, and 0.90 respectively. From the analysis, the proposed method has a high delivery ratio value compared with the WOA, PSO, and FA methods. Similarly, the other parameters are analyzed and compared with the existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Ilavendhan, A., & Saruladha, K. (2020). Comparative analysis of various approaches for DoS attack detection in VANETs. Proceedings of the International Conference on Electronics and Sustainable Communication Systems, ICESC, 2020, 821–825.

    Google Scholar 

  2. Bourg, L., Chatzidimitris, T., Chatzigiannakis, I., Gavalas, D., Giannakopoulou, K., Kasapakis, V., Konstantopoulos, C., Kypriadis, D., Pantziou, G., & Zaroliagis, C. (2021). Enhancing shopping experiences in smart retailing. Journal of Ambient Intelligence and Humanized Computing, 1–19.

  3. Dhiman, G., Garg, M., Nagar, A., Kumar, V., & Dehghani, M. (2020). A novel algorithm for global optimization: Rat swarm optimizer. Journal of Ambient Intelligence and Humanized Computing, 1–26.

  4. Lim, K., Islam, T., Kim, H., & Joung, J. (2020). A Sybil attack detection scheme based on ADAS sensors for vehicular networks. In 2020 IEEE 17th annual consumer communications and networking conference, CCNC 2020.

  5. Lim, K., Tuladhar, K. M., & Kim, H. (2019). Detecting location spoofing using ADAS sensors in VANETs. In 2019 16th IEEE annual consumer communications and networking conference, CCNC 2019.

  6. Dey, C., Bose, R., Ghosh, K. K., Malakar, S., & Sarkar, R. (2021). LAGOA: Learning automata based grasshopper optimization algorithm for feature selection in disease datasets. Journal of Ambient Intelligence and Humanized Computing, 1–20.

  7. Sakiz, F., & Sen, S. (2017). A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Networks, 61, 33–50.

    Article  Google Scholar 

  8. Karukula, N. R., & Farooq, S. M. (2013). A route map for detecting Sybil attacks in urban vehicular networks. Journal of Information, Knowledge, and Research in Computer Engineering, 2(2), 540–544.

    Google Scholar 

  9. Sumathi, J., & Velusamy, R. L. (2021). A review on distributed cluster based routing approaches in mobile wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 12, 835–849.

    Article  Google Scholar 

  10. Balamahalakshmi, D., & Vimal Shankar, K. N. (2014). Sybil attack detection with reduced bandwidth overhead in urban vehicular networks. International Journal of Computer Science and Mobile Computing, 3(1), 578–584.

    Google Scholar 

  11. Satheshkumar, K., & Mangai, S. (2021). EE-FMDRP: Energy efficient-fast message distribution routing protocol for vehicular ad-hoc networks. Journal of Ambient Intelligence and Humanized Computing, 12(3), 3877–3888.

    Article  Google Scholar 

  12. Gietelink, O., Ploeg, J., De Schutter, B., & Verhaegen, M. (2006). Development of advanced driver assistance systems with vehicle hardware-in-the-loop simulations. Vehicle System Dynamics, 44(7), 569–590.

    Article  Google Scholar 

  13. Cherkaoui, B., Beni-hssane, A., & Erritali, M. (2020). Variable control chart for detecting black hole attack in vehicular ad-hoc networks. Journal of Ambient Intelligence and Humanized Computing, 11(11), 5129–5138.

    Article  Google Scholar 

  14. Jose, A. A., Pramod, A., Philip, G., & George, S. J. (2019). Sybil attack detection in vanet using spidermonkey technique and ECC. International Journal of Wireless Communications and Networking Technologies, 8(3), 31–34.

    Article  Google Scholar 

  15. Arianmehr, S., & Jabraeil Jamali, M. A. (2019). HybTGR: A hybrid routing protocol based on topological and geographical information in vehicular ad hoc networks. Journal of Ambient Intelligence and Humanized Computing, 1–13.

  16. Yao, Y., Xiao, B., Yang, G., Yujiao, Hu., Wang, L., & Zhou, X. (2019). Power control identiication: A novel Sybil attack detection scheme in VANETs using RSSI. IEEE Journal on Selected Areas in Communications, 37(11), 2588–2602.

  17. Ghaffari, A. (2020). Hybrid opportunistic and position-based routing protocol in vehicular ad hoc networks. Journal of Ambient Intelligence and Humanized Computing, 11(4), 1593–1603.

    Article  Google Scholar 

  18. Yu, B., Xu, C.-Z., & Xiao, B. (2013). Detecting Sybil attacks in VANETs. Journal of Parallel and Distributed Computing, 73(6), 746–756.

    Article  Google Scholar 

  19. Alsarhan, A., Alauthman, A., Alshdaifat, E. A., Al-Ghuwairi, A. R., & Al-Dubai, A. (2021). Machine learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks. Journal of Ambient Intelligence and Humanized Computing, 1–10.

  20. Chang, S., Qi, Y., Zhu, H., Zhao, J., & Shen, X. (2012). Footprint: Detecting Sybil attacks in urban vehicular networks. IEEE Transactions on Parallel and Distributed Systems, 23(6), 1103–1114.

    Article  Google Scholar 

  21. Saxena, N. K., Kumar, A., & Gupta, V. (2021). Enhancement of system performance using STATCOM as dynamic compensator with squirrel cage induction generator (SCIG) based microgrid. International Journal of Emerging Electric Power Systems, 22(2), 177–189.

    Article  Google Scholar 

  22. Gupta, V., Chaturvedi, Y., Saxena, N. K., Sharma, A. K., & Gupta, V. (2021). ECG signal analysis using emerging tools in current scenario of health informatics. In 2021 11th International conference on cloud computing, data science & engineering (confluence) 582–587. IEEE.

  23. Chaturvedi, Y., Gupta, V., Chandra A., & Goel, A. (2021). Performance evaluation of seig under unbalanced load operations using genetic algorithm. In Communication and intelligent systems, 265–274.

  24. Sumra, A., & Hasbullah, H. et al. (2011). VANET security research and development ecosystem. In 2011 National postgraduate conference—energy and sustainability: Exploring the innovative minds, NPC 2011 (pp. 1–4).

  25. Zhou, T., Choudhury, R. R., Ning, P., & Chakrabarty, K. (2011). P2DAP—Sybil attacks detection in vehicular ad hoc networks. IEEE Journal on Selected Areas in Communications, 29(3), 582–594.

    Article  Google Scholar 

  26. Singh, P., Ram, R. S., & and Khan, S. A. (2021). Link risk degree aided routing protocol based on weight gradient for health monitoring applications in vehicular ad-hoc networks. Journal of Ambient Intelligence and Humanized Computing, 1–23.

  27. Ramamoorthy, R., & Thangavelu, M. (2021). An enhanced hybrid ant colony optimization routing protocol for vehicular ad-hoc networks. Journal of Ambient Intelligence and Humanized Computing, 1–32.

  28. Harrag, N., Refoufi, A., & Harrag, A. (2019). New NSGA-II-based OLSR self-organized routing protocol for mobile ad hoc networks. Journal of Ambient Intelligence and Humanized Computing, 10(4), 1339–1359.

    Article  Google Scholar 

  29. Yao, Y., Xiao, B., Gaofei, Wu., Liu, X., Zhiwen, Yu., Zhang, K., & Zhou, X. (2019). Multi-channel based Sybil attack detection in vehicular ad hoc networks using RSSI. IEEE Transactions on Mobile Computing, 18(2), 362–375.

    Article  Google Scholar 

  30. Bensaber, B. A., Diaz, C. G. P., & Lahrouni, Y. (2020). Design and modeling an adaptive neuro-fuzzy inference system (ANFIS) for the prediction of a security index in VANET. Journal of Computational Science, 47, 101234.

    Article  MathSciNet  Google Scholar 

  31. Halabi, T., Wahab, O. A., & Zulkernine, M. (2020). A game-theoretic approach for distributed attack mitigation in intelligent transportation systems. In Proceedings of IEEE/IFIP network operations and management symposium 2020: Management in the age of softwarization and artificial intelligence, NOMS 2020.

  32. Ayaida, M., Messai, N., Wilhelm, G., & Najeh, S. (2019). A novel Sybil attack detection mechanism for C-ITS. In 2019 15th international wireless communications & mobile computing conference (IWCMC) 2019 (pp. 913–918). IEEE.

  33. Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2017). “VANET security challenges and solutions: A survey. Vehicular Communications, 7, 7–20.

    Article  Google Scholar 

  34. Parham, M., & Pouyan, A. A. (2020). An effective privacy-aware Sybil attack detection scheme for secure communication in vehicular ad hoc network. Wireless Personal Communications, 113(2), 1149–1182.

    Article  Google Scholar 

  35. Baza, M., Nabil, M., Mahmoud, M. M. E. A., Bewermeier, N., Fidan, K., Alasmary, W., & Abdallah, M. (2020). Detecting sybil attacks using proofs of work and location in vanets. IEEE Transactions on Dependable and Secure Computing.

  36. Kumar, A., Varadarajan, V., Kumar, A., Dadheech, P., Choudhary, S. S., Kumar, V. A., Panigrahi, B. K., & Veluvolu, K. C. (2021). Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm. Microprocessors and Microsystems, 80, 103352.

    Article  Google Scholar 

  37. Christo, M. S., & Meenakshi, S. (2016). Reliable and authenticated rumor riding protocol for unstructured peer-to-peer network. Indian Journal of Science and Technology, 9(21), 1–9.

    Google Scholar 

  38. Christo, M. S., & Meenakshi, S. (2018). Enhancing rumor riding protocol in P2P network with cryptographic puzzle through challenge question method. Computers & Electrical Engineering, 65, 122–138.

    Article  Google Scholar 

  39. Siddaramappa, V., & Ramesh, K. B. (2019). DNA-based XOR operation (DNAX) for data security using DNA as a storage medium. Integrated Intelligent Computing, Communication and Security, 771, 343–351.

    Article  Google Scholar 

  40. Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103–115.

    Article  Google Scholar 

  41. Harifi, S., Khalilian, M., Mohammadzadeh, J., & Ebrahimnejad, S. (2019). Emperor Penguins Colony: A new metaheuristic algorithm for optimization. Evolutionary Intelligence, 12(2), 211–226.

    Article  Google Scholar 

  42. Harifi, S., Khalilian, M., Mohammadzadeh, J., & Ebrahimnejad, S. (2021). Optimization in solving inventory control problem using nature inspired Emperor Penguins Colony algorithm. Journal of Intelligent Manufacturing, 32(5), 1361–1375.

    Article  Google Scholar 

  43. Kaur, H., Rai, A., Bhatia, S. S., & Dhiman, G. (2020). MOEPO: A novel multi-objective Emperor Penguin Optimizer for global optimization: Special application in ranking of cloud service providers. Engineering Applications of Artificial Intelligence, 96, 104008.

    Article  Google Scholar 

  44. Xing, Z. (2020). An improved emperor penguin optimization based multilevel thresholding for color image segmentation. Knowledge-Based Systems, 194, 105570.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nitha C Velayudhan.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Velayudhan, N.C., Anitha, A. & Madanan, M. Sybil Attack with RSU Detection and Location Privacy in Urban VANETs: An Efficient EPORP Technique. Wireless Pers Commun 122, 3573–3601 (2022). https://doi.org/10.1007/s11277-021-09102-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-09102-x

Keywords

Navigation