A Comparative Analysis of Sybil Attacks on VANET

Download Full Text
Rohika Bhatt, Parveen Thakur
Published Date:
December 05, 2015
Volume 5, Issue 2
7 - 17

vanet, sybil attacks, passve attacks, RSU, intrusion detection
Rohika Bhatt, Parveen Thakur, "A Comparative Analysis of Sybil Attacks on VANET ". International Journal of Research in Computer Science, 5 (2): pp. 7-17, December 2015. Other Formats


In this research work a sincere attempt is made to review the problem of attacks in VANET domain since, network security in VANETs is of immensely challenging. The distributed nature of VANET allows each of the vehicle nodes to function both as a host as well as router to remain connected with other nodes. As nodes very frequently move in and out of the range of each other, consequently network topology also changes frequently compromising the security of the network. And it is prone to lot security gaps. This paper discusses the type of attacks and their possible solutions for mitigating the attack in context of Sybil attack. An alternative method after systematic review of the proposed in this research work shows that anonymity factor can be increased and sequence mining can detect the Sybil attack with low computational overhead and low false rate.

  1. T. Leinmuller, E. Schoch, and C. Maihofer, (2007)“Security requirements and solutions concepts in vehicular ad hoc networks”. In Proceedings of Fourth Annual Conference on Wireless on Demand Network Systems and Services.
  2. P. Papadimitratos, V. Gligor, and J.-P. Hubaux,(2006) “Securing vehicular communications— assumptions, requirements, and principles”. In Proceedings of the Workshop on Embedded Security on Cars (ESCAR)
  3. M. Raya and J.-P. Hubaux,(2007)” Securing vehicular ad hoc networks”. Journal of Computer Security, 15(1), 39–68.
  4. A. Aijaz, B. Bochow, F. Dtzer, A. Festag, M.Gerlach, R. Kroh, andT. Leinmuller,(2006) “Attacks on inter-vehicle communication systems—an analysis”. In Proceedings of the 3rd international Workshop on Intelligent Transportation (WIT).
  5. Haberle, T.; Charissis, L.; Fehling, C.; Nahm, J.; Leymann, F., "The Connected Car in the Cloud: A Platform for Prototyping Telematics Services," in Software, IEEE, vol.32, no.6, pp.11-17, Nov.-Dec. 2015. Vezzani, R.; Cucchiara, R., "Event driven software architecture for multi-camera and distributed surveillance research systems," in Computer Vision and Pattern Recognition Workshops (CVPRW), 2010 IEEE Computer Society Conference on, vol., no., pp.1-8, 13-18 June 2010.
  6. Chun-Hung Wang; Mong-Fong Horng; Jeng-Wei Lee; Yu-Chan Liu; Ren-Shang Tsai; Wei-Tong Wang; Lan Chang; Yaw-Huang Kuo; Pau-Choo Chung; Kuo-Feng Ssu, "Development of Intelligent Home Health-Care Box Connecting Medical Equipments and Its Service Platform," in Advanced Communication Technology, The 9th International Conference on, vol.1, no., pp.311-315, 12-14 Feb. 2007.
  7. Chaurasia, B.K.; Tomar, R.S.; Verma, S.; Tomar, G.S., "Suitability of MANET Routing Protocols for Vehicular Ad Hoc Networks," in Communication Systems and Network Technologies (CSNT), 2012 International Conference on, vol., no., pp.334-338, 11-13 May 2012.
  8. Yeongkwun Kim; Injoo Kim, "Security issues in vehicular networks," in Information Networking (ICOIN), 2013 International Conference on, vol., no., pp.468-472, 28-30 Jan. 2013.
  9. Na Ruan; Nishide, T.; Hori, Y., "Threshold ElGamal-based key management scheme for distributed RSUs in VANET," in Mobile and Wireless Networking (iCOST), 2011 International Conference on Selected Topics in, vol., no., pp.133-138, 10-12 Oct. 2011
  10. Wagan, A.A.; Mughal, B.M.; Hasbullah, H., "VANET Security Framework for Trusted Grouping Using TPM Hardware," in Communication Software and Networks, 2010. ICCSN '10. Second International Conference on, vol., no., pp.309-312, 26-28 Feb. 2010.
  11. Zhu Xiaoling; Hu Donghui; Hou Zhengfeng; Ding Liang, "A location privacy preserving solution to resist passive and active attacks in VANET," in Communications, China, vol.11, no.9, pp.60-67, Sept. 2014
  12. Cao, Zigang; Xiong, Gang; Guo, Li, "MimicHunter: A General Passive Network Protocol Mimicry Detection Framework," in Trustcom/BigDataSE/I???SPA, 2015 IEEE, vol.1, no., pp.271-278, 20-22 Aug. 2015.
  13. Dietzel, S.; Gurtler, J.; van der Heijden, R.; Kargl, F., "Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes," in Vehicular Networking Conference (VNC), 2014 IEEE, vol., no., pp.135-142, 3-5 Dec. 2014.
  14. Feiri, M.; Petit, J.; Schmidt, R.K.; Kargl, F., "The impact of security on cooperative awareness in VANET," in Vehicular Networking Conference (VNC), 2013 IEEE, vol., no., pp.127-134, 16-18 Dec. 2013
  15. Sayegh, N.; Elhajj, I.H.; Kayssi, A.; Chehab, A., "SCADA Intrusion Detection System based on temporal behavior of frequent patterns," in Mediterranean Electro technical Conference (MELECON), 2014 17th IEEE, vol., no., pp.432-438, 13-16 April 2014.
  16. AlMheiri, S.M.; AlQamzi, H.S., "MANETs and VANETs clustering algorithms: A survey," in GCC Conference and Exhibition (GCCCE), 2015 IEEE 8th, vol., no., pp.1-6, 1-4 Feb. 2015.
  17. Mukherjee, B.; Heberlein, L.T.; Levitt, K.N., "Network intrusion detection," in Network, IEEE, vol.8, no.3, pp.26-41, May-June 1994.
  18. Krishna, T.R.V.; Barnwal, R.P.; Ghosh, S.K., "MDS-Based Trust Estimation of Event Reporting Node in VANET," in Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, vol., no., pp.315-320, 16-18 July 2013.
  19. Tong Zhou, Romit Roy Choudhury, Peng Ning, and Krishnendu Chakrabarty., P2DAP – “Sybil Attacks Detection in Vehicular Ad Hoc Networks”, IEEE journal on selected areas in communications, vol. 29, no. 3, march 2011.
  20. Erritali, M.; El Ouahidi, B., "A review and classification of various VANET Intrusion Detection Systems," in Security Days (JNS3), 2013 National, vol., no., pp.1-6, 26-27 April 2013.
  21. Raut, S.B.; Malik, L.G., "Survey on vehicle collision prediction in VANET," in Computational Intelligence and Computing Research (ICCIC), 2014 IEEE International Conference on, vol., no., pp.1-5, 18-20 Dec. 2014.
  22. Jeong, H.J.; WooSeok Hyun; Jiyoung Lim; Ilsun You, "Anomaly Teletraffic Intrusion Detection Systems on Hadoop-Based Platforms: A Survey of Some Problems and Solutions," in Network-Based Information Systems (NBiS), 2012 15th International Conference on, vol., no., pp.766-770, 26-28 Sept. 2012.
  23. Ajay Rawat, Santosh Sharma, Rama Sushil, "Vanet: Security Attacks and its Possible Solutions," Journal of Information and Operations Management, Volume 3, Issue 1, pp-301-304, 2012.
  24. Schmidt, Robert K., Tim Leinmüller, Elmar Schoch, Albert Held, and Günter Schäfer. "Vehicle behavior analysis to enhance security in vanets." In Proceedings of the 4th IEEE Vehicle-to-Vehicle Communications Workshop (V2VCOM2008). 2008.
  25. Hussain, Rasheed, Sangjin Kim, and Heekuck Oh. "Privacy-aware VANET security: Putting data-centric misbehavior and sybil attack detection schemes into practice." In Information Security Applications, pp. 296-311. Springer Berlin Heidelberg, 2012.
  26. Ruj, Sushmita, Marcos Cavenaghi, Zhen Huang, Amiya Nayak, and Ivan Stojmenovic. "On data-centric misbehavior detection in VANETs." In Vehicular Technology Conference (VTC Fall), 2011 IEEE, pp. 1-5. IEEE, 2011.
  27. Chandrapal U. Chauhan, V.A.Gulhane, "Signature Based Rule Matching Technique in Network Intrusion Detection System." International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4, pp 412-41, April 2012.

    Sorry, there are no citation(s) for this manuscript yet.