CFP last date
20 January 2025
Reseach Article

A Survey on Sybil Attack in Vehicular Ad-hoc Network

by Deepak Kushwaha, Piyush Kumar Shukla, Raju Baraskar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 15
Year of Publication: 2014
Authors: Deepak Kushwaha, Piyush Kumar Shukla, Raju Baraskar
10.5120/17262-7614

Deepak Kushwaha, Piyush Kumar Shukla, Raju Baraskar . A Survey on Sybil Attack in Vehicular Ad-hoc Network. International Journal of Computer Applications. 98, 15 ( July 2014), 31-36. DOI=10.5120/17262-7614

@article{ 10.5120/17262-7614,
author = { Deepak Kushwaha, Piyush Kumar Shukla, Raju Baraskar },
title = { A Survey on Sybil Attack in Vehicular Ad-hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 15 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 31-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number15/17262-7614/ },
doi = { 10.5120/17262-7614 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:26:19.103816+05:30
%A Deepak Kushwaha
%A Piyush Kumar Shukla
%A Raju Baraskar
%T A Survey on Sybil Attack in Vehicular Ad-hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 15
%P 31-36
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Vehicular Ad-hoc network is new and emerging technology. Researchers are gaining interest in this technology. Due to its open nature it is vulnerable to various attacks. Sybil attack is one of them. Various defense techniques have been given by researchers. In this work we briefly explain those defense techniques, given recently. We categorize these techniques as trusted certificates base, resource testing based and social network based. We give an overview of some defense schemes based on first two categories. We also give a summary of the techniques given in this paper, which is based on some parameters used in those techniques.

References
  1. Bayrem Triki, Slim Rekhis, Mhamed Chammem, Noureddine Boudriga, "A privacy preseriving solution for the protection against Sybil attacks in vehicular ad-hoc networks", Wireless and Mobile Networking Conference, 2013.
  2. Chen Chen, Xin Wang, Weili Han, Binyu Zang, "A robust detection of the Sybil attack in urban VANETs", ICDCS Workshop 2009.
  3. W. Chang, J. Wu, "A survey of Sybil attack in Networks", . Sensor Networks for Sustainable Development, CRC Press.
  4. S. Park, B. Aslam, D. Turgut, Cliff C. Zou, "Defence Against Sybil Attack in Vehicular Ad-hoc Network Based on Roadside Unit Support", In MILCOM, pages 1-7, 2009.
  5. Bo Yu, Chang-Zhong Xu, Bin Xiao, "Detecting Sybil Attacks in VANETs", In: Journal of Parallel and Distributed Computing 73. 6 (2013), pp. 746 –756.
  6. Mina Rahbari, Mohammad Ali Jabreil Jamali, "Efficient Detection of Sybil Attack Based on Cryptography in VANET", International Journal of Network Security & Its Applications (IJNSA) (November 2011).
  7. Shan Chang, Yong Qi, Hongzi Zhu,Jizhong Zhao, Xuemin(Sherman) Shen, "Footprint: Detecting Sybil Attacks in Urban Vehicular Networks", Parallel and Distributed Systems, IEEE Transactions on, vol. 23. no. 6, 2012, pp. 1103-1114; DOI 10. 1109/tpds. 2011. 263.
  8. Kenza Mekliche, Dr. Samira Moussaoui, "L-P2DSA: Location-based Privacy-Preserving Detection of Sybil Attacks", 11th international symposium on programming and systems (April 2013), pp. 187-192.
  9. Rasheed Hussain, Heekuck oh, "On Secure and Privacy Aware Sybil Attack Detection in Vehicular Communication", In Journal of Wireless Personal Communication, DOI: 10. 1007/s11277-014-1659-5.
  10. Tong Zhou, Romit R. Choudhury, P. Ning, K. Chakrabarty, "P2DAP- Sybil Attacks Detection in Vehicular Ad-hoc Networks", IEEE Journal on Selected Areas in Communications 29(3), 582–594 (2011).
  11. John R. Douceur, "The Sybil Attack", Proc. IPTPS, p. 251-260, March 07-08, 2002.
  12. P. Golle, D. Greene, J. Staddon, "Detecting and correcting malicious data in VANETs", Proc. of ACM International Workshop on VANET 2004, pp. 29–37, 2004.
  13. G. Korkmaz, E. Ekici, Urban multi-hop broadcast protocol for inter-vehicle communication systems, in: Proc. of the 1st ACM International Workshop on Vehicular ad Hoc Networks, VANET 2004, pp. 76–85, 2004.
  14. R. M. Yadumurthy, A. Chimalakonda, M. Sadashivaiah, R. Makanaboyina, "Reliable mac broadcast protocol in directional and omni-directional transmissions for vehicular ad hoc networks", Proc. of the 2nd ACM International Workshop on VANET 2005, pp. 10–19, 2005.
  15. J. Zhao, G. Cao, "VADD: Vehicle-Assisted Data Delivery in vehicular ad hoc networks", IEEE Transactions on Vehicular Technology 57 (3) (2008).
  16. KIM, K. H. ,CHOI, E. Y. , LEE3, S. M. , , AND LEE, D. H. "Secure epcglobal class-1 gen-2 rfid system against security and privacy problems", In On The Move (OTM) Workshops, LNCS 4277 (2006), 362–371.
Index Terms

Computer Science
Information Sciences

Keywords

Vehicular Ad-hoc Network Sybil Attack Certification Authority.