scispace - formally typeset
Open Access

A Time-series Clustering Approach for Sybil Attack Detection in Vehicular Ad hoc Networks

Neelanjana Dutta, +1 more
- pp 35-40
Reads0
Chats0
TLDR
A fuzzy time-series clustering based approach that does not require any additional hardware or infrastructure support for Sybil attack detection in vehicular ad hoc networks that leverages the dispersion of vehicle platoons over time in a network and detects Sybil nodes as those which are traveling closely in a cluster for an unusually long time.
Abstract
Sybil attack is a security threat wherein an attacker creates and uses multiple counterfeit identities risking trust and functionality of a peer-to-peer system. Sybil attack in vehicular ad hoc networks is an emergent threat to the services and security of the system. In the highly dynamic environment of vehicular ad hoc networks, due to mobility and density of nodes, it is challenging to detect the nodes that are launching Sybil attack. Existing techniques mostly use additional hardware or complex cryptographic solutions for Sybil attack detection in vehicular ad hoc networks. In this paper, we propose a fuzzy time-series clustering based approach that does not require any additional hardware or infrastructure support for Sybil attack detection in vehicular ad hoc networks. The proposed technique leverages the dispersion of vehicle platoons over time in a network and detects Sybil nodes as those which are traveling closely in a cluster for an unusually long time. Simulation results and analysis show that the approach is able to identify Sybil nodes with very low false positive and false negative rates even under varying intensity of attack.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Artificial Intelligence for Vehicle-to-Everything: A Survey

TL;DR: This paper presents a comprehensive survey of the research works that have utilized AI to address various research challenges in V2X systems and summarized the contribution and categorized them according to the application domains.
Proceedings ArticleDOI

A Survey of Anomaly Detection for Connected Vehicle Cybersecurity and Safety

TL;DR: Key observations emerging from the survey are: real-world datasets are seldom used, but instead, most results are derived from simulations; V2V/V2I communications and in vehicle communication are not considered together.
Journal ArticleDOI

State-of-the-art approach to clustering protocols in VANET: a survey

TL;DR: An in-depth classification of clustering protocols in VANET based on their design objectives is provided and essential research contributions of each category are explored comprehensively.
Journal ArticleDOI

Novel Trusted Hierarchy Construction for RFID Sensor–Based MANETs Using ECCs

TL;DR: A novel combination of steps in lightweight protocol integration to provide a secure network for RFID sensor–based MANETs using error‐correcting codes (ECCs) using a quasi‐cyclic ECC.
Journal ArticleDOI

Identifying Region-Wide Functions Using Urban Taxicab Trajectories

TL;DR: A scheme to discover region-wide functions using large-scale Shanghai taxicab trajectories that capture enormous traces for more than 13,000 taxicabs over a period of about 3 years is proposed.
References
More filters
Proceedings ArticleDOI

Mining association rules between sets of items in large databases

TL;DR: An efficient algorithm is presented that generates all significant association rules between items in the database of customer transactions and incorporates buffer management and novel estimation and pruning techniques.
Book ChapterDOI

The Sybil Attack

TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Proceedings ArticleDOI

Detecting and correcting malicious data in VANETs

TL;DR: A general approach to evaluating the validity of VANET data, where a node searches for possible explanations for the data it has collected based on the fact that malicious nodes may be present and accepts the data as dictated by the highest scoring explanations.
Proceedings ArticleDOI

Detection and localization of sybil nodes in VANETs

TL;DR: This paper presents a lightweight security scheme for detecting and localizing Sybil nodes in VANETs, based on statistic analysis of signal strength distribution, and proposes two statistic algorithms to enhance the accuracy of position verification.
Journal ArticleDOI

Security attacks and solutions for vehicular ad hoc networks

TL;DR: The authors discuss some of the main security threats and attacks that can be exploited in VANETs and present the corresponding security solutions that can been implemented to thwart those attacks.
Related Papers (5)