scispace - formally typeset
Search or ask a question
Book ChapterDOI

A Taxonomy of Sybil Attacks in Vehicular Ad-Hoc Network (VANET)

TL;DR: This chapter studies various dimension of VANETs including its structure, communication architecture, security issues, and critical review of technique to detect Sybil attacks.
Abstract: Vehicular ad hoc networks (VANETs) are a class of ad hoc networks in which vehicle communicate with each other to show the traffic situation and any mishappening on the road. VANET is vulnerable to a number of attacks due to its infrastructure-less nature. One of these attacks is the Sybil attack. Security of data dissemination in VANET is very crucial, otherwise any mishappening can occur on road. Sybil attack is very difficult to be defended and detected, especially when it is launched by some conspired attackers using their legitimate identities, and this has become a growing research interest in VANETs in past few years. This chapter studies various dimension of VANETs including its structure, communication architecture, security issues, and critical review of technique to detect Sybil attacks.
Citations
More filters
Journal ArticleDOI
TL;DR: A mathematical model based on the characteristics of the VANET network and the well-known disease-spreading model SIR (Susceptible–Infectious–Recovered– Susceptible) is proposed, which shows that, when R0 < 1, the malware spreading will gradually decrease, and, whenR0 > 1, that spreading cannot be extinguished.
Abstract: Network attacking using malware has become very popular on the Internet and in many other networks, namely Vehicular Ad-hoc Network (VANET) networks. It is required to have the model describing the malware spreading based on factors, which directly affect this process to limit its influences. In this paper, we propose a mathematical model called SEIR-S (Susceptible–Exposed–Infectious–Recovered–Susceptible) based on the characteristics of the VANET network and the well-known disease-spreading model SIR (Susceptible–Infectious–Recovered). We take into account possible behaviors of malware and provide the corresponding states to vehicles: Susceptible (S), Exposed (E), Infectious (I), Recovered (R). We evaluate the basic reproduction number R0 of the model and perform a stability analysis of the proposed model. The results show that, when R0 1, that spreading cannot be extinguished. We also point out the condition that we can control the endemic in the VANET network. In addition, the correctness of the proposed model is verified using both numerical analysis and agent-based simulation on NetLogo.

8 citations

Proceedings ArticleDOI
09 Jun 2022
TL;DR: The problems of the Sybil attack in VANE T technology are discussed and recently proposed approaches for thesybil attack are investigated and discussed.
Abstract: VANETs are a kind of mobile ad hoc network (MANET) that provides a wide range of safety applications to vehicle passengers. VANETs are gaining popularity as a measure of the capacity to connect to a diverse set of unseen services. VANETs also enable road operators to monitor and monitor cars in order to reduce risky driving and give prompt relief. However, these networks create design, routing, communication, and security challenges. These networks are subject to a number of security vulnerabilities due to the utilization of wireless communication channels. When a malicious vehicle or RSU can assume several identities, it offers one of the most serious threats to the survival of such networks. VANET is susceptible to a range of assaults because to its lack of infrastructure. The Sybil assault is one of them. A malevolent vehicle in a V ANET may transmit false messages about traffic, an accident ahead, a road restriction, and so on. This may force the driver to take a diversion, placing him in danger of an unfavorable incident. V ANET has shown a variety of issues. The security service technologies that are available, as well as the corresponding processing algorithms. This article discusses the problems of the Sybil attack in VANE T technology. Also, this research will investigate and discuss recently proposed approaches for the Sybil attack.

5 citations

Proceedings ArticleDOI
24 Nov 2022
TL;DR: In this paper , the authors explore the taxonomy of Sybil attacks in VANETs along with available countermeasures and investigate all dimensions of the Sybil attack and its possible countermeasures.
Abstract: The Vehicular Ad-hoc Network (VANET) is an essential component of the Intelligent Transportation System (ITS) that provides wireless connectivity between stationary Road-Side-Units (RSUs) and vehicles over the road. VANET has transformed the automobile industry by simplifying vehicle monitoring, reducing dangerous driving, and offering prompt assistance. However, due to the inherent design flaws and infrastructure-less deployment, a VANET is vulnerable to various security attacks. One of the most devastating attacks in these networks is the Sybil attack. Consequently, the Sybil attack countermeasure has become a rising area of research interest in VANET. To protect VANET against the severity of the Sybil attack, it is necessary to thoroughly investigate all dimensions of the Sybil assault and its available countermeasures. This work explores the taxonomy of the Sybil assault in VANETs along with available countermeasures.

1 citations

Book ChapterDOI
TL;DR: The study analyzes the bandwidth available in a segment of route in the VANET network, since this value directly affects sporadic cloud computing, and tests it on a highly complex urban scenario where a number of mobile nodes were used with random conditions both in mobility and in resources of transmission.
Abstract: The study analyzes the bandwidth available in a segment of route in the VANET network, since this value directly affects sporadic cloud computing. For this purpose, the bandwidth was tested on a highly complex urban scenario, where a number of mobile nodes were used with random conditions both in mobility and in resources of transmission. The results of the tests show that the stability of the bandwidth available in each region is proportional to the number of real mobile nodes in the region. However, a considerable bandwidth is also reached with a smaller number of mobile nodes, but there is no stability in the region, thus causing the network to collapse. The VANET network simulation tool was NS-3, since it is currently one of the most commonly used free software that allows configure the simulation parameters in a vehicular environment. The urban simulation scenario is the historic center of the City of Bogota, Colombia, which was created with SUMO for obtaining the mobility traces.
References
More filters
Journal ArticleDOI
22 Dec 2000-Science
TL;DR: Locally linear embedding (LLE) is introduced, an unsupervised learning algorithm that computes low-dimensional, neighborhood-preserving embeddings of high-dimensional inputs that learns the global structure of nonlinear manifolds.
Abstract: Many areas of science depend on exploratory data analysis and visualization. The need to analyze large amounts of multivariate data raises the fundamental problem of dimensionality reduction: how to discover compact representations of high-dimensional data. Here, we introduce locally linear embedding (LLE), an unsupervised learning algorithm that computes low-dimensional, neighborhood-preserving embeddings of high-dimensional inputs. Unlike clustering methods for local dimensionality reduction, LLE maps its inputs into a single global coordinate system of lower dimensionality, and its optimizations do not involve local minima. By exploiting the local symmetries of linear reconstructions, LLE is able to learn the global structure of nonlinear manifolds, such as those generated by images of faces or documents of text.

15,106 citations

Journal ArticleDOI
22 Dec 2000-Science
TL;DR: An approach to solving dimensionality reduction problems that uses easily measured local metric information to learn the underlying global geometry of a data set and efficiently computes a globally optimal solution, and is guaranteed to converge asymptotically to the true structure.
Abstract: Scientists working with large volumes of high-dimensional data, such as global climate patterns, stellar spectra, or human gene distributions, regularly confront the problem of dimensionality reduction: finding meaningful low-dimensional structures hidden in their high-dimensional observations. The human brain confronts the same problem in everyday perception, extracting from its high-dimensional sensory inputs-30,000 auditory nerve fibers or 10(6) optic nerve fibers-a manageably small number of perceptually relevant features. Here we describe an approach to solving dimensionality reduction problems that uses easily measured local metric information to learn the underlying global geometry of a data set. Unlike classical techniques such as principal component analysis (PCA) and multidimensional scaling (MDS), our approach is capable of discovering the nonlinear degrees of freedom that underlie complex natural observations, such as human handwriting or images of a face under different viewing conditions. In contrast to previous algorithms for nonlinear dimensionality reduction, ours efficiently computes a globally optimal solution, and, for an important class of data manifolds, is guaranteed to converge asymptotically to the true structure.

13,652 citations

Journal ArticleDOI
Hao Ye1, Le Liang1, Geoffrey Ye Li1, Kim Joonbeom2, Lu Lu2, May Wu2 
TL;DR: Recent advances in applying machine learning in vehicular networks are reviewed and an attempt is made to bring more attention to this upcoming area.
Abstract: The emerging vehicular networks are expected to make everyday vehicular operation safer, greener, and more efficient and pave the path to autonomous driving in the advent of the fifth-generation (5G) cellular system. Machine learning, as a major branch of artificial intelligence, has been recently applied to wireless networks to provide a data-driven approach to solve traditionally challenging problems. In this article, we review recent advances in applying machine learning in vehicular networks and attempt to bring more attention to this upcoming area.

245 citations

Journal ArticleDOI
01 Jan 2015
TL;DR: This paper starts with the basic architecture of networks, then discusses three popular research issues and general research methods, and ends up with the analysis on challenges and future trends of VANETs.
Abstract: Vehicular ad hoc networks (VANETs) have been quite a hot research area in the last few years. Due to their unique characteristics such as high dynamic topology and predictable mobility, VANETs attract so much attention of both academia and industry. In this paper, we provide an overview of the main aspects of VANETs from a research perspective. This paper starts with the basic architecture of networks, then discusses three popular research issues and general research methods, and ends up with the analysis on challenges and future trends of VANETs.

191 citations

Journal ArticleDOI
TL;DR: The key characteristics of VANETs are explained, a meta-survey of research works are provided and a tutorial approach to introducing VANets is taken and the intricate details are discussed.
Abstract: Vehicular Ad-hoc Networks (VANETs) are seen as the key enabling technology of Intelligent Transportation Systems (ITS). In addition to safety, VANETs also provide a cost-effective platform for numerous comfort and entertainment applications. A pragmatic solution of VANETs requires synergistic efforts in multidisciplinary areas of communication standards, routings, security and trust. Furthermore, a realistic VANET simulator is required for performance evaluation. There have been many research efforts in these areas, and consequently, a number of surveys have been published on various aspects. In this article, we first explain the key characteristics of VANETs, then provide a meta-survey of research works. We take a tutorial approach to introducing VANETs and gradually discuss intricate details. Extensive listings of existing surveys and research projects have been provided to assess development efforts. The article is useful for researchers to look at the big picture and channel their efforts in an effective way.

106 citations