scholarly journals Obfuscated RSUs Vector Based Signature Scheme for Detecting Conspiracy Sybil Attack in VANETs

2017 ◽  
Vol 2017 ◽  
pp. 1-11 ◽  
Author(s):  
Xia Feng ◽  
Jin Tang

Given the popularity of vehicular Ad hoc networks (VANETs) in traffic management, a new challenging issue comes into traffic safety, that is, security of the networks, especially when the adversary breaks defence. Sybil attack, for example, is a potential security threat through forging several identities to carry out attacks in VANETs. At this point, the paper proposed a solution named DMON that is a Sybil attack detection method with obfuscated neighbor relationship of Road Side Units (RSUs). DMON presents a ring signature based identification scheme and replaces vehicles’ identities with their trajectory for the purpose of anonymity. Furthermore, the neighbor relationship of RSUs is obfuscated to achieve privacy preserving of locations. The proposed scheme has been formally proved in the views of security and performance. Simulation has also been implemented to validate the scheme, in which the findings reveal the lower computational overhead and higher detection rate comparing with other related solutions.

Vehicular Ad-hoc Networks (VANETs) are gaining rapid momentum with the increasing number of vehicles on the road. VANETs are ad-hoc networks where vehicles exchange information about the traffic, road conditions to each other or to the road-side infrastructures. VANETs are characterized by high mobility and dynamic topology changes due to the high-speed vehicles in the network. These characteristics pose security challenges as vehicles can be conceded. It is critical to address security for the sake of protecting private data of vehicle and to avoid flooding of false data which defeats the purpose of VANETs. Sybil attack is one of the attacks where a vehicle fakes multiple vehicle identity to compromise the whole network. In this work, a direct trust manager is introduced which derives the trust value of each of its neighbor nodes at a regular interval of time. If the trust value is deviated, it confirms sybil attack. The proposed system is compared with the existing system to prove improved sybil attack detection ratio, thus providing better security. NS2 environment is used to prove the simulation results. The experimental results show that the attack detection ratio of SAD-V-DTC is 5 times better than that of the existing system. The packet delivery ratio shows an improvement of 27.27% while the false positive shows a good increase of 65.80% than the existing system.


Author(s):  
Nirbhay Kumar Chaubey ◽  
Dhananjay Yadav

<span>Vehicular ad hoc network (VANET) is an emerging technology which can be very helpful for providing safety and security as well as for intelligent transportation services. But due to wireless communication of vehicles and high mobility it has certain security issues which cost the safety and security of people on the road. One of the major security concerns is the Sybil attack in which the attacker creates dummy identities to gain high influence in the network that causes delay in some services and fake voting in the network to misguide others. The early detection of this attack can prevent people from being misguided by the attacker and save them from getting into any kind of trap. In this research paper, Sybil attack is detected by first applying the Poisson distribution algorithm to predict the traffic on the road and in the second approach, analysis of the network performance for packet delivery ratio (PDR) is performed in malign and benign environment. The simulation result shows that PDR decreases in presence of fake vehicles in the network. Our approach is simple and effective as it does not require high computational overhead and also does not violate the privacy issues of people in the network.</span>


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1063
Author(s):  
L. Ellen Funderburg ◽  
Im-Yeong Lee

Vehicular ad hoc networks (VANETs) face two important and conflicting challenges with regards to security: preserve the privacy of vehicles in order to prevent malicious entities from tracking users and detect and remove bad actors that attempt to game the system for their own advantage. In particular, detecting Sybil attacks, in which one node attempts to appear as many, seemingly conflicts with the goal of privacy preservation, and existing schemes fail on either one or both accounts. To fill this gap, we present a hierarchical key management system which uses short group signatures to preserve member privacy at lower levels while allowing mid-level nodes to detect Sybil attacks and highly trusted nodes at the top of the hierarchy to completely reveal the real identities of malicious nodes in order to prevent them from rejoining the system and for use by legal authorities. In addition, we present an argument for relaxing the requirement of backward secrecy in VANET groups in the case when no malicious activity has been detected.


Author(s):  
José María De Fuentes ◽  
Ana Isabel González-Tablas ◽  
Arturo Ribagorda

Vehicular ad-hoc networks (VANETs) are a promising communication scenario. Several new applications are envisioned, which will improve traffic management and safety. Nevertheless, those applications have stringent security requirements, as they affect road traffic safety. Moreover, VANETs face several security threats. As VANETs present some unique features (e.g. high mobility of nodes, geographic extension, etc.) traditional security mechanisms are not always suitable. Because of that, a plethora of research contributions have been presented so far. This chapter aims to describe and analyze the most representative VANET security developments.


2019 ◽  
Vol 18 (2) ◽  
pp. 362-375 ◽  
Author(s):  
Yuan Yao ◽  
Bin Xiao ◽  
Gaofei Wu ◽  
Xue Liu ◽  
Zhiwen Yu ◽  
...  

Author(s):  
Karamjeet Kaur ◽  
Sanjay Batish ◽  
Arvind Kakaria

Vehicular Ad hoc networks (VANETs) are considered as a promising approach for facilitating road safety, traffic management and infotainment dissemination for drivers and passengers. The development of wireless communication in VANET implies to take into account the need of security. Many attacks rely on having the attackers generate multiple identities to simulate multiple nodes, this is called Sybil attack. In this paper, we discuss various approaches proposed by different researchers to defend against Sybil attack.


Author(s):  
Sepha Siswantyo

VANET is an ad-hoc network implemented on vehicle communication to ensure traffic safety and traffic management efficiency. VANET security is a concern because of various vulnerabilities, especially from authentication criteria that the attacker can exploit. VANET is vulnerable to Sybil attack, entity impersonation, message modification, and identity falsification. Several mechanisms and protocols have been developed to address these vulnerabilities. The design of the VANET authentication protocol also needs to be proven using formal methods to ensure that the protocol meets the required security criteria.  In this research, the security of VANET authentication protocol developed by Zhao et al. was analyzed using the Datta et al. security protocol analysis method. Instead of BAN Logic, the Scyther tool was used to verify security claims and find possible attacks. Our Security analysis results show that Zhao et al.'s protocol does not meet confidentiality and entity authentication criteria. Scyther tool can find attacks on nonce confidentiality and man-in-the-middle attack. Therefore, we modify Zhao et al. protocol by adding signature and session key confirmation to improve its security. Based on analysis results, our modified Zhao et al. authentication protocol met confidentiality and entity authentication criteria. The use of signature and session key confirmation prevents man-in-the-middle attack and protects nonce confidentiality. Therefore, our research concludes that modified Zhao et al. authentication protocol more secure than the original protocol in terms of nonce and session key confidentiality, aliveness, weak agreement, non-injective agreement, and non-injective synchronization.


Sign in / Sign up

Export Citation Format

Share Document