Computer Science ›› 2014, Vol. 41 ›› Issue (Z11): 235-240.

Previous Articles     Next Articles

Research on Detection Schemes of Sybil Attack in VANETs

LI Chun-yan and WANG Liang-min   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In vehicular ad hoc networks (VANETs)Sybil attack is an attack in which a malicious vehicle obtains multiple false identities through the way of forgery,stolen or conspiracy.The attacker uses these false identities to do misbehaviors which can threaten the lives and properties of other drivers and passengers.The cause and hazards of Sybil attack in vehicular ad hoc networks were introduced firstly.Then a survey of existing Sybil attack detection schemes was made.According as whether the detection process is related to positionthe detection schemes are classified into two categories:Non-position-based detection schemes and Position-based detection schemes.Comparison of detection schemes in each category was introduced elaborately as well.Finally,the problems in existing detection methods and some possible directions for future research were proposed.

Key words: Vehicular ad hoc networks,Sybil attack detection schemes,Sybil attack,Non-position-based detection schemes,Position-based detection schemes

[1] Blum J,Eskandarian A,Hoffman L.Challenges of inter-vehicle ad hoc networks [J].IEEE Transactions on Intelligent Transportation Systems,2004,5(4):347-351
[2] 常促宇,向勇,史美林.车载自组网的现状与发展[J].通信学报,2007,28(11):116-127
[3] 乔震,刘光杰,李季,等.移动自组织网络安全接入技术研究综述 [J].计算机科学,2013,40(20):1-9
[4] 王良民,李晓君,仲红.VANET中一种可撤销的车辆群组批认证方法 [J].中国科学:信息科学,2013,43(10):1307-1325
[5] Douceur J R.The Sybil attack [C]∥Proceeding of International Workshop on Peer-to-peer Systems.Cambridge.USA,IEEE,2002:251-260
[6] Razzaque M A,Salehi A,Cheraghi S M.Security and privacy in vehicular Ad-Hoc networks:survey and the road ahead [M]∥Wireless Networks and Security.Springer Berlin Heidelberg,2013:107-132
[7] Hartenstein H,Laberteaux K P.A tutorial survey on vehicular ad hoc networks [J].Communications Magazine,IEEE,2008,46(6):164-171
[8] Lacroix J,El-Khatib K.Vehicular Ad Hoc Network Security and Privacy:A Second Look [C]∥The Third International Conference on Advances in Vehicular SystemsTechnologies and Applications(VEHICULAR 2014).2014:6-15
[9] Al Sultan S,Al Doori M M,Bayatti A H,et al.A comprehensive survey on vehicular Ad Hoc network [J].Journal of Network and Computer Applications,2014,37:380-392
[10] 王良民,茅冬梅,梁军.基于RFID系统的隐私保护技术[J].江苏大学学报:自然科学版,2012,33(6):690-695
[11] Bissmeyer N,Stresing C,Bayarou K M.Intrusion detection inVANETs through verification of vehicle movement data [C]∥Vehicular Networking Conference (VNC) 2010.New Jersey,USA,IEEE,2010:166-173
[12] Ding Qing,Li Xi,Jiang Ming,et al.Reputation-based trust modelin vehicular ad hoc networks [C]∥International Conference on Wireless Communications and Signal Processing (WCSP).Suzhou,China,2010:1-6
[13] Chen Yi-ming,Wei Yu-chih.A beacon-based trust management system for enhancing user centric location privacy in VANETs [J].Journal of Communications and Networks,2013,15(2):153-163
[14] Korkmaz G,Ekici E,Ozguner F,et al.Urban multi-hop broadcast protocol for inter-vehicle communication systems [C]∥Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks.Philadelphia,PA,USA,ACM,2004:76-85
[15] Zhao Jing,Cao Guo-hong.VADD:Vehicle-assisted data delivery in vehicular ad hoc networks [J].IEEE Transactions on Vehicular Technology,2008,57(3):1910-1922
[16] Karp B,Kung H T.GPSR:Greedy perimeter stateless routing for wireless networks [C]∥Proceedings of the 6th Annual International Conference on Mobile Computing and Networking.Boston,MA,USA,ACM,2000:243-254
[17] Newsome J,Shi E,Song D,et al.The Sybil attack in sensor networks:analysis & defenses [C]∥Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks.Berkeley,California,USA:ACM,2004:259-268
[18] Yu H,Kaminsky M,Gibbons P B,et al.SybilGuard:Defendingagainst Sybil attacks via social networks [J].IEEE/ACM Transactions on Networking,2008,16(3):576-589
[19] Danezis G,Mittal P.SybilInfer:Detecting Sybil Nodes using Social Networks [C]∥Proceedings of the Network and Distributed System Security Symposium.San Diego,California,USA,2009:1-15
[20] Margolin N B,Levine B N.Quantifying resistance to the Sybil attack [M]∥Financial Cryptography and Data Security.Springer Berlin Heidelberg,2008:1-15
[21] Raya M,Hubaux J P.Securing vehicular ad hoc networks [J].Journal of Computer Security,2007,15(1):39-68
[22] 李春彦,刘怡良,王良民.车载自组网中基于交通场景的入侵行为检测机制 [J].山东大学学报:工学版,2013,43(6):14-19
[23] Rahbari M,Jamali J.Efficient detection of Sybil attack based on cryptography in VANET [J].International Journal of Network Security & its Applications (IJNSA).2011,3(6):185-195
[24] Guette G,Bryce C.Using TPMs to secure vehicular ad-hoc networks (VANETs) [M]∥Information Security Theory and Practices.Smart Devices,Convergence and Next Generation Networks.Springer Berlin Heidelberg.2008:106-116
[25] Park S,Aslam B,Turgut D,et al.Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support [J].Security and Communication Networks,2013,6(4):523-538
[26] Studer A,Shi E,Bai F,et al.TACKing together efficient authentication,revocation,and privacy in VANETs [C]∥6th Annual IEEE Communications Society Conference on Sensor,Mesh and Ad Hoc Communications and Networks(SECON09).Rome,Italy,IEEE,2009:1-9
[27] Sun Yi-pin,Lu Rong-xing,Lin Xiao-dong,et al.An efficientpseudonymous authentication scheme with strong privacy pre-servation for vehicular communications [J].IEEE Transactions on Vehicular Technology,2010,59(7):3589-3603 (下转第262页)(上接第240页)
[28] Ruj S,Cavenaghi M A,Huang Z,et al.On data-centric misbehavior detection in VANETs [C]∥Vehicular Technology Conference (VTC Fall).San Francisco,CA,USA,IEEE,2011:1-5
[29] Lu Rong-xing,Li Xiao-dong,Luan T H,et al.Pseudonym changing at social spots:an effective strategy for location privacy in VANETs [J].IEEE Transactions on Vehicular Technology,2012,61(1):86-96
[30] Pan Yuan-yuan,Li Jian-qing,Feng Li,et al.An analytical model for random pseudonym change scheme in VANETs [J].Cluster Computing,2013:1-9
[31] Zhou Tong,Choudhury R R,Ning Peng,et al.P2DAP—Sybil Attacks Detection in Vehicular Ad Hoc Networks [J].IEEE Journal on Selected Areas in Communications,2011,29(3):582-594
[32] Golle P,Greene D,Staddon J.Detecting and correcting malicious data in VANETs [C]∥Proceedings of the 1st ACM internationalworkshop on Vehicular ad hoc networks.Philadelphia,PA,USA,ACM,2004:29-37
[33] Grover J,Prajapati N K,Laxmi V,et al.Machine learning approach for multiple misbehavior detection in VANET [M]∥Advances in Computing and Communications.Springer Berlin Heidelberg,2011:644-653
[34] Grover J,Gaur M S,Laxmi V,et al.A Sybil attack detection approach using neighboring vehicles in VANET [C]∥Proceedings of the 4th International Conference on Security of Information and Networks.Sydney,Australia,ACM,2011:151-158
[35] Chen Chen,Wang X,Han Wei-li,et al.A robust detection of the Sybil attack in urban VANETs [C]∥The 29th IEEE International Conference on Distributed Computing Systems Workshops(ICDCS 2009).Montreal,Quebec,Canada,IEEE,2009:270-276
[36] Chang Shan,Qi Yong,Zhu Hong-zi,et al.Footprint:detecting Sybil attacks in urban vehicular networks [J].IEEE Transactions on Parallel and Distributed Systems,2012,23(6):1103-1114
[37] Guette G,Ducourthial B.On the Sybil attack detection in VANET [C]∥IEEE International Conference on Mobile Ad hoc and Sensor Systems(MASS 2007).Pisa,Italy,IEEE,2007:1-6
[38] Yu Bo,Xu Cheng-zhong,Xiao Bin.Detecting Sybil attacks inVANETs [J].Journal of Parallel and Distributed Computing,2013:746-756
[39] Grover J,Kumar D,Sargurunathan M,et al.Performance evaluation and detection of Sybil attacks in vehicular ad-hoc networks [M]∥Recent Trends in Network Security and Applications.Springer Berlin Heidelberg,2010:473-482
[40] Capun S,Hubaux J P.Secure positioning of wireless deviceswith application to sensor networks [C]∥Proceeding of 24th Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM 2005).Miami,USA,IEEE,2005:1917-1928
[41] Bouassida M S,Guette G,Shawky M,et al.Sybil nodes detection based on received signal strength variations within VANET [J].IJ Network Security,2009,9(1):22-33
[42] Leinmuller T,Schoch E,Kargl F.Position verification approa-ches for vehicular ad hoc networks [J].IEEE Wireless Communications,2006,13(5):16-21
[43] Hao Yong,Tang Jin,Cheng Yu.Cooperative Sybil attack detection for position based applications in privacy preserved VANETs[C]∥Global Telecommunications Conference (GLOBECOM 2011).Houston,Texas,USA,IEEE,2011:1-5

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!