CFP last date
20 December 2024
Reseach Article

Strategical Comparison: Recognizing and Evicting Sybil Attack in Vehicular Ad Hoc Networks

by Sagar Narang, Kundan Munjal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 100 - Number 15
Year of Publication: 2014
Authors: Sagar Narang, Kundan Munjal
10.5120/17602-8216

Sagar Narang, Kundan Munjal . Strategical Comparison: Recognizing and Evicting Sybil Attack in Vehicular Ad Hoc Networks. International Journal of Computer Applications. 100, 15 ( August 2014), 27-34. DOI=10.5120/17602-8216

@article{ 10.5120/17602-8216,
author = { Sagar Narang, Kundan Munjal },
title = { Strategical Comparison: Recognizing and Evicting Sybil Attack in Vehicular Ad Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 100 },
number = { 15 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 27-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume100/number15/17602-8216/ },
doi = { 10.5120/17602-8216 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:30:03.535319+05:30
%A Sagar Narang
%A Kundan Munjal
%T Strategical Comparison: Recognizing and Evicting Sybil Attack in Vehicular Ad Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 100
%N 15
%P 27-34
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Vehicular Ad-Hoc Networks (VANET) generalization of Mobile Ad Hoc Networks (MANET) are proclaimed for extreme mobility as compared to MANET. Motivation of VANET is Traffic Administration and Human Protection. Misuse of utilities provided by VANET is more prone to attacks like Black Hole Attack and Sybil Attack. This paper is fascinated towards recognition and eviction of Sybil Attack in VANET. In Sybil Attack evil-minded nodes known as Sybil nodes imitates multiple fraud identities of one vehicle at same time distorting behavior of right-minded nodes in network vulnerable to human lives. In this paper, different strategies of finding, locating and evicting Sybil Nodes in VANET are suggested and differentiated.

References
  1. M. Frodigh, P. Johansson, and P. Larsson. “Wireless ad hoc networking: the art of networking without a network,” Ericsson Review, No.4, 2000, pp. 248-263.
  2. Joseph P. Macker, M. Scott Corson: “Mobile Ad-hoc Networks (MANET) and The IETF” Volume 2 Issue 1, January 1998, Pages 9-14.
  3. Jun-Zhao Sun, Machine Vision & Media Process Unit, Oulu Univ, Finland: “Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing”, pp. 316 - 321 vol.3, 2001
  4. J. Douceur “The Sybil Attack” In First International Workshop on Peer- to-Peer Systems, pages 251–260, 2002.
  5. J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil Attack in Sensor Networks: Analysis & Defences.” Proc. Of International symposium on information processing in sensor networks, pp 259–268, 2004.
  6. Murat Demirbas, Youngwhan Song, “An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks”, In Proceedings of WoWMoM 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2006. 5 pp. – 570
  7. M. Raya and J.-P. Hubaux, (2007)” Securing vehicular ad hoc networks”. Journal of Computer Security, 15(1), 39–68.
  8. G. Guette and C. Bryce, “Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs),” Proc. of WISTP 08, LNCS 5019, pp. 106-116, 2008.
  9. H. Chan, A. Perrig, and D. Song “Random key pre-distribution schemes for sensor networks” . In IEEE Symposium on Security and Privacy, pages 197–213, Berkeley, California, May 11-14 2003.
  10. R. Anderson and M. Kuhn “Tamper resistance - a cautionary note” In Proceedings of the Second Usenix Workshop on Electronic Commerce, pages 1–11, November 1996.
  11. L. Eschenauer and V. D. Gligor “A key-management scheme for distributed sensor networks”. In Proceedings of the 9th ACM conference on Computer and communications security, November 2002.
  12. S. Park, B. Aslam, D. Turgut, Cliff C. Zou (2009)” Defense against Sybil attack in vehicular ad-hoc network based on roadside unit support”. In: MILCOM, pp. 1–7.
  13. T. Zhou, R.R. Choudhury, P. Ning and K. Chakrabarty, “Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks,” Proc. of International Conference on MobiQuitous 2007, pp. 1-8, 2007.
  14. Kenza Mekliche, Dr. Samira Moussaoui L-P2DSA, “Location-based privacy-preserving detection of Sybil attacks,” Programming and Systems (ISPS), 2013 11th International Symposium on Digital Object Identifier: 10.1109/ISPS.2013.6581485 Publication Year: 2013, Page(s): 187-192
  15. Zhou Wang, Chunxiao Chigan, “Countermeasure Uncooperative Behaviors with Dynamic Trust-Token in VANETs” Communications, 2007. ICC '07. IEEE International Conference on Digital Object Identifier: 10.1109/ICC.2007.652 Publication Year: 2007, Page(s): 3959- 3964
  16. Bayrem Triki, Slim Rekhis, Mhamed Chammem, and Noureddine Boudriga, “A Privacy Preserving Solution for the Protection Against Sybil Attacks in Vehicular Ad Hoc Networks” Wireless and Mobile Networking Conference (WMNC), 2013 6th Joint IFIP, Digital Object Identifier: 10.1109/WMNC.2013.6549051 Publication Year: 2013 , Page(s): 1-8
  17. LEE, E.-K., YANG, S., OH, S. Y., AND GERLA, M “RF-GPS: RFID assisted localization in vanets” Mobile Adhoc and Sensor Systems, 2009. MASS ’09. IEEE 6th International Conference on (October 2009).
  18. Azzedine Boukerche, Horacio A.B.F. Oliveira, Eduardo F. Nakamura, Antonio A.F. Loureiro: “Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems” , Volume 31 Issue 12, July 2008, Pages 2838-2849
  19. R. Parker, S. Valaee: “Vehicle localization in Vehicular Networks” , in: Vehicular Technology Conference, 2006. VTC-2006 Fall. 2006 IEEE 64th, 2006, pp. 1–5.
Index Terms

Computer Science
Information Sciences

Keywords

Sybil attack recognition eviction and localization GPS RFID VANET PKI Observers DTT Privacy preserving RF-GPS Certificate and Key administration Pseudonyms and RSU.