Skip to main content
Log in

On Secure and Privacy-Aware Sybil Attack Detection in Vehicular Communications

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The foreseen dream of Vehicular Ad Hoc NETwork (VANET) deployment is obstructed by long-chased security and privacy nightmares. Despite of the increasing demand for perfect privacy, it conflicts with rather more serious security threat called ‘Sybil Attack’ which refers to, impersonation of one physical entity for many, namely Sybil nodes. In such circumstances, data received from malicious Sybil attacker may seem as if it was received from many distinct physical nodes. Sybil nodes may deliberately mislead other neighbors, resulting in catastrophic situations like traffic jams or even deadly accidents. Preventing such attacks in a privacy-enabled environment is not a trivial task. In this paper, we aim at two conflicting goals, i.e. privacy and Sybil attack in VANET. We leverage pseudonymless beaconing in order to preserve privacy. To cope with Sybil attack, we put forth a twofold strategy. In order to avoid Sybil attack through scheduled beacons, we employ tamper resistant module (TRM) to carry out a pre-assembly data analysis on data that is used to assemble beacons whereas for event reporting message (ERM), we employ road side units (RSUs) to localize Sybil nodes in VANET and report them to the revocation authority(s). RSUs distribute authorized tokens among the benign vehicular nodes which in turn are consumed to report ERMs. RSUs collect ERMs for certain event and figures out if more than one ERM for the same event includes identical token or, if an ERM is sent more than once by the same source. Our proposed scheme preserves privacy in both beacons and ERMs, and provides conditional anonymity where in case of a dispute; malicious attackers are subject to revocation. We also show that our proposed scheme outperforms the previously proposed scheme from security and computational complexity standpoint.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. The notion of DMV might be different depending upon the government structure of the country.

  2. Terms ‘vehicles’, ‘vehicular nodes’, and ‘nodes’ are used in this paper interchangeably.

  3. The terms ‘event reporting’ and ‘warning’ are used interchangeably in this paper because ERM serves as warning to the receiver as well.

References

  1. Chen, C., Xin, W., Weili, H., & Binyu, Z. (2009). A robust detection of the sybil attack in urban VANETs. In 29th IEEE international conference on distributed computing systems workshops, ICDCS Workshops ’09 (pp. 270–276).

  2. Chenxi, Z., Rongxing, L., Xiaodong, L., Pin-Han, H., & Xuemin, S. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In IEEE INFOCOM, The 27th Conference on Computer Communications (pp. 246–250).

  3. Costa, P., Gavidia, D., Koldehofe, B., Miranda, H., Musolesi, M., & Riva, O. (2008). When cars start gossiping. In Proceedings of the 6th workshop on Middleware for network eccentric and mobile applications, ACM, Glasgow, Scotland (pp. 1–4).

  4. Delgrossi, L., & Zhang, T. (2009). Dedicated Short-Range Communications. Vehicle Safety Communications: Protocols, Security, and Privacy (pp. 44–51).

  5. Douceur, J. R. (2002). The sybil attack. International Workship on Peer to Peer Systems (pp. 251–260).

  6. Gerlach, M., & Guttler, F. (2007). Privacy in VANETs using changing pseudonyms—ideal and real. In IEEE 65th Vehicular Technology Conference, VTC2007-Spring (pp. 2521–2525).

  7. Grover, J., Gaur, M. S., & Laxmi, V. (2010). A novel defense mechanism against sybil attacks in VANET. In Proceedings of the 3rd international conference on security of information and networks, ACM, Taganrog, Rostov-on-Don, Russian Federation (pp. 249–255).

  8. Grover, J., Gaur, M. S., & Laxmi, V. (2011). Sybil Attack in VANETs- Detection and Prevention (pp. 269–294). Security of Self-Organizing Networks, Taylor and Francis Group, LLC.

  9. Guette, G., & Ducourthial, B. (2007). On the Sybil attack detection in VANET. IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS 2007 (pp. 1–6).

  10. Hussain, R., Kim, S., & Oh, H. (2012). Privacy-aware VANET security: Putting data-centric misbehavior and sybil attack detection schemes into practice. Internet Security Applications, 2012 (WISA 2012) (pp. 296–311).

  11. Hussain, R., Kim, S., & Oh, H. (2009). Information security applications. In H. Youm & M. Yung (Eds.), Towards privacy aware pseudonymless strategy for avoiding profile generation in VANET (pp. 268–280). Berlin/Heidelberg: Springer.

    Google Scholar 

  12. Ibrahim, K., & Weigle, M. C. (2008). CASCADE: Cluster-based accurate syntactic compression of aggregated data in VANETs. In IEEE GLOBECOM Workshops (pp. 1–10).

  13. Ibrahim, K., Weigle, M. C., & Abuelela, M. (2009). p-IVG: Probabilistic inter-vehicle geocast for dense vehicular networks. In IEEE 69th Vehicular Technology Conference. VTC Spring (pp. 1–5).

  14. Jinyuan, S., Chi, Z., Yanchao, Z., & Yuguang, F. (2010). An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Transactions on Parallel and Distributed Systems, 21, 1227–1239.

    Article  Google Scholar 

  15. Leinmuller, T., Schoch, E., & Maihofer, C. (2007). Security requirements and solution concepts in vehicular ad hoc networks. Wireless on demand network systems and services, WONS ’07. Fourth Annual Conference on (pp. 84–91).

  16. Levine, A. N., Shields, C., & Margolin, N. B. (2006). A survey of solutions to the sybil attack. Amherst, MA: University of Massachusetts.

    Google Scholar 

  17. Martucci, L. A., Kohlweiss, M., Andersson, C., & Panchenko, A. (2008). Self-certified Sybil-free pseudonyms. In Proceedings of the first ACM conference on Wireless network security (pp. 154–159). ACM, Alexandria, VA, USA.

  18. Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., et al. (2008). Secure vehicular communication systems: Design and architecture. IEEE Communications Magazine, 46, 100–109.

    Google Scholar 

  19. Plößl, K., & Federrath, H. (2008). A privacy aware and efficient security infrastructure for vehicular ad hoc networks. Computer Standards & Interfaces, 30, 390–397.

    Article  Google Scholar 

  20. Ruj, S., Cavenaghi, M. A., Zhen, H., Nayak, A., & Stojmenovic, I. (2011). On data-centric misbehavior detection in VANETs. IEEE Vehicular Technology Conference (VTC Fall) (pp. 1–5).

  21. Scheuer, F., Posse, K., & Federrath, H. (2008). Preventing profile generation in vehicular networks. networking and communications, WIMOB ’08. IEEE International Conference on Wireless and Mobile, Computing (pp. 520–525).

  22. Schmidt, R. K., Leinmuller, T., Schoch, E., Held, A., & Schafer, G. (2008). Vehicle behavior analysis to enhance security in vanets. Fourth workshop on vehicle to vehicle, communications (V2VCOM 2008).

  23. Schmidt, R., Leinmuller, T., Schoch, E., Kargl, F., & Schafer, G. (2010). Exploration of adaptive beaconing for efficient intervehicle safety communication. IEEE Network, 24, 14–19.

    Article  Google Scholar 

  24. Shan, C., Yong, Q., Hongzi, Z., Jizhong, Z., & Xuemin, S. (2012). Footprint: Detecting sybil attacks in urban vehicular networks. IEEE Transactions on Parallel and Distributed Systems, 23, 1103–1114.

    Article  Google Scholar 

  25. Sommer, C., Tonguz, O. K., & Dressler, F. (2011). Traffic information systems: Efficient message dissemination via adaptive beaconing. IEEE Communications Magazine, 49, 173–179.

    Article  Google Scholar 

  26. Soyoung, P., Aslam, B., Turgut, D., & Zou, C. C. (2009). Defense against Sybil attack in vehicular ad hoc network based on roadside unit support. IEEE Military Communications Conference, MILCOM, 2009, 1–7.

    Google Scholar 

  27. Tong, Z., Choudhury, R. R., Peng, N., & Chakrabarty, K. (2011). P2DAP: Sybil attacks detection in vehicular ad hoc networks. IEEE Journal on Selected Areas in Communications, 29, 582–594.

    Article  Google Scholar 

  28. Wasef, A., Yixin, J., & Xuemin, S. (2008). ECMV: Efficient certificate management scheme for vehicular networks. IEEE Global Telecommunications Conference, GLOBECOM, 2008, 1–5.

    Google Scholar 

  29. Xiao, B., Yu, B., & Gao, C. (2006). Detection and localization of sybil nodes in VANETs. In Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks. (pp. 1–8). Los Angeles, CA, USA: ACM.

  30. Yipin, S., Rongxing, L., Xiaodong, L., Xuemin, S., & Jinshu, S. (2010). An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Transactions on Vehicular Technology, 59, 3589–3603.

    Article  Google Scholar 

  31. Yong, H., Jin, T., & Yu, C. (2011). Cooperative sybil attack detection for position based applications in privacy preserved VANETs. In IEEE Global Telecommunications Conference (GLOBECOM 2011) (pp. 1–5).

Download references

Acknowledgments

This work was supported by the National Research Foundation of Korea (NRF) Grant funded by the Ministry of Education, Science and Technology (No. 2012-R1A2A2A01046986). This work was supported by the National Research Foundation of Korea (NRF) Grant funded by the Korea government (MEST) (No. 2012-R1A1A2009152). This research was supported by the MSIP Ministry of Science, ICT & Future Planning, Korea, under the ITRC (Information Technology Research Center) support program (NIPA-2013-H0301-13-1002) supervised by the NIPA(National IT Industry Promotion Agency).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Heekuck Oh.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hussain, R., Oh, H. On Secure and Privacy-Aware Sybil Attack Detection in Vehicular Communications. Wireless Pers Commun 77, 2649–2673 (2014). https://doi.org/10.1007/s11277-014-1659-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-014-1659-5

Keywords

Navigation