scispace - formally typeset
Open accessJournal ArticleDOI: 10.1080/17445760.2019.1617865

Detecting Sybil attacks in vehicular ad hoc networks

04 Mar 2021-International Journal of Parallel, Emergent and Distributed Systems (Informa UK Limited)-Vol. 36, Iss: 2, pp 69-79
Abstract: Ad hoc networks are vulnerable to numerous attacks due to its infrastructure-less nature, one of these attacks is the Sybil attack. Sybil attack is a severe attack on vehicular ad hoc netwo...

... read more


6 results found

Open accessJournal ArticleDOI: 10.3390/S20226441
11 Nov 2020-Sensors
Abstract: The rapid growth of the Internet of Things (IoT) applications and their interference with our daily life tasks have led to a large number of IoT devices and enormous sizes of IoT-generated data. The resources of IoT devices are limited; therefore, the processing and storing IoT data in these devices are inefficient. Traditional cloud-computing resources are used to partially handle some of the IoT resource-limitation issues; however, using the resources in cloud centers leads to other issues, such as latency in time-critical IoT applications. Therefore, edge-cloud-computing technology has recently evolved. This technology allows for data processing and storage at the edge of the network. This paper studies, in-depth, edge-computing architectures for IoT (ECAs-IoT), and then classifies them according to different factors such as data placement, orchestration services, security, and big data. Besides, the paper studies each architecture in depth and compares them according to various features. Additionally, ECAs-IoT is mapped according to two existing IoT layered models, which helps in identifying the capabilities, features, and gaps of every architecture. Moreover, the paper presents the most important limitations of existing ECAs-IoT and recommends solutions to them. Furthermore, this survey details the IoT applications in the edge-computing domain. Lastly, the paper recommends four different scenarios for using ECAs-IoT by IoT applications.

... read more

Topics: Edge computing (55%), Cloud computing (53%), Big data (51%)

14 Citations

Book ChapterDOI: 10.4018/978-1-7998-2570-8.CH009
Nirbhay Chaubey1, Dhananjay Yadav2Institutions (2)
01 Jan 2020-
Abstract: Vehicular ad hoc networks (VANETs) are a class of ad hoc networks in which vehicle communicate with each other to show the traffic situation and any mishappening on the road. VANET is vulnerable to a number of attacks due to its infrastructure-less nature. One of these attacks is the Sybil attack. Security of data dissemination in VANET is very crucial, otherwise any mishappening can occur on road. Sybil attack is very difficult to be defended and detected, especially when it is launched by some conspired attackers using their legitimate identities, and this has become a growing research interest in VANETs in past few years. This chapter studies various dimension of VANETs including its structure, communication architecture, security issues, and critical review of technique to detect Sybil attacks.

... read more

5 Citations

Open accessBook ChapterDOI: 10.1007/978-981-15-3750-9_8
01 Jan 2020-
Abstract: Networks of autonomous vehicles roaming in smart cities raise new challenges for end-to-end protection of data in terms of integrity, privacy, efficiency, and scalability. This paper provides a survey of Networks of Trusted Execution Environments (NTEE) architectures. NTEE combine the strong, hardware-rooted security guarantees of the TEE deployed locally in the vehicle, with the distributed protection of a decentralized consensus protocol. We identify three main families of consensus protocols and analyze their architectures, performance, and security, including improvements brought by the TEE. Overall, voting protocols tend to be more efficient for smaller networks, while lottery-based schemes are not easy to apply in a vehicular context due to higher overheads. Both types of protocols reach an intermediate level of security, with variations in byzantine tolerance and types of threats. Graph-based protocols tend to achieve both efficiency and flexibility in terms of network topology support, but their security still remains to be explored.

... read more

Topics: Vehicular ad hoc network (54%), Data Protection Act 1998 (53%), Network topology (52%) ... show more

4 Citations

Open accessJournal ArticleDOI: 10.3390/ELECTRONICS10182223
01 Sep 2021-Electronics
Abstract: Over the past decade, the groundbreaking technological advancements in the Internet of Vehicles (IoV) coupled with the notion of trust have attracted increasing attention from researchers and experts in intelligent transportation systems (ITS), wherein vehicles establish a belief towards their peers in the pursuit of ensuring safe and efficacious traffic flows. Diverse domains have been taking advantage of trust management models in the quest of alleviating diverse insider attacks, wherein messages generated by legitimate users are altered or counterfeited by malicious entities, subsequently, endangering the lives of drivers, passengers, and vulnerable pedestrians. In the course of vehicles forming perceptions towards other participating vehicles, a range of contributing parameters regarding the interactions among these vehicles are accumulated to establish a final opinion towards a target vehicle. The significance of these contributing parameters is typically represented by associating a weighting factor to each contributing attribute. The values assigned to these weighting factors are often set manually, i.e., these values are predefined and do not take into consideration any affecting parameters. Furthermore, a threshold is specified manually that classifies the vehicles into honest and dishonest vehicles relying on the computed trust. Moreover, adversary models as an extension to trust management models in order to tackle the variants of insider attacks are being extensively emphasized in the literature. This paper, therefore, reviews the state of the art in the vehicular trust management focusing on the aforementioned factors such as quantification of weights, quantification of threshold, misbehavior detection, etc. Moreover, an overarching IoV architecture, constituents within the notion of trust, and attacks relating to the IoV have also been presented in addition to open research challenges in the subject domain.

... read more

1 Citations

Journal ArticleDOI: 10.1007/S12652-021-03379-3
Abstract: Vehicular ad-hoc networks (VANET) technology, which is an open-access network, renders a quick, simple to deploy, and cheap solution for intelligent traffic control as well as traffic disaster preventive measure but it is prone to disparate sorts of attacks. The Sybil attack (SA) is the most harmful attacks that the VANET has to face. In this, the attacker generates manifold identities to fake manifold nodes. It is extremely onerous to defend as well as detect, especially if it is commenced by means of some connived attackers utilizing their genuine identities. Here, a deep learning-centered intrusion detections system (IDS) is proposed utilizing CMEHA-DNN for detecting the SA in VANET. The proposed technique encompasses ‘4’ steps: (i) cluster formation (CF), (ii) cluster head (CH) selection, (iii) attack detection, and (iv) security of VANET. Initially, the MKHM clustering algorithm clusters the vehicles. Next, the Floyd–Warshall algorithm (FWA) selects the CH as of the clusters. Subsequent to CH selection, the malevolent CH is identified utilizing the deep leaning model CMEHA-DNN by means of extracting the pertinent features as of the CH. Lastly, subsequent to detection, if the CH is a normal one, the information contained by means of the CH is securely sent to the cloud utilizing the MD5-ECC. The proposed work attains an accuracy of 98.37% and a security level of 98.2%, which is better compared to existing methods.

... read more

Topics: Sybil attack (58%)


31 results found

Proceedings ArticleDOI: 10.1145/984622.984660
26 Apr 2004-
Abstract: Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack based on J.R. Douceur (2002), where a node illegitimately claims multiple identities. This paper systematically analyzes the threat posed by the Sybil attack to wireless sensor networks. We demonstrate that the attack can be exceedingly detrimental to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc. We establish a classification of different types of the Sybil attack, which enables us to better understand the threats posed by each type, and better design countermeasures against each type. We then propose several novel techniques to defend against the Sybil attack, and analyze their effectiveness quantitatively.

... read more

1,339 Citations

Journal ArticleDOI: 10.1016/J.JNCA.2013.02.036
Abstract: Vehicular ad hoc networks (VANETs) are classified as an application of mobile ad hoc network (MANET) that has the potential in improving road safety and in providing travellers comfort. Recently VANETs have emerged to turn the attention of researchers in the field of wireless and mobile communications, they differ from MANET by their architecture, challenges, characteristics and applications. In this paper we present aspects related to this field to help researchers and developers to understand and distinguish the main features surrounding VANET in one solid document, without the need to go through other relevant papers and articles starting from VANET architecture and ending up with the most appropriate simulation tools to simulate VANET protocols and applications.

... read more

1,059 Citations

Open accessProceedings ArticleDOI: 10.1145/1102219.1102223
Maxim Raya1, Jean-Pierre Hubaux1Institutions (1)
07 Nov 2005-
Abstract: Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made, which in some cases have more than mere technical implications. We provide a set of security protocols, we show that they protect privacy and we analyze their robustness, and we carry out a quantitative assessment of the proposed solution.

... read more

1,053 Citations

Open accessPosted Content
Phillip Rogaway1, Thomas Shrimpton2Institutions (2)
Abstract: We consider basic notions of security for cryptographic hash functions: collision resistance, preimage resistance, and second-preimage resistance. We give seven different definitions that correspond to these three underlying ideas, and then we work out all of the implications and separations among these seven definitions within the concrete-security, provable-security framework. Because our results are concrete, we can show two types of implications, conventional and provisional , where the strength of the latter depends on the amount of compression achieved by the hash function. We also distinguish two types of separations, conditional and unconditional . When constructing counterexamples for our separations, we are careful to preserve specified hash-function domains and ranges; this rules out some pathological counterexamples and makes the separations more meaningful in practice. Four of our definitions are standard while three appear to be new; some of our relations and separations have appeared, others have not. Here we give a modern treatment that acts to catalog, in one place and with carefully-considered nomenclature, the most basic security notions for cryptographic hash functions.

... read more

Topics: Preimage attack (70%), Collision resistance (66%), Hash function (61%) ... show more

439 Citations

Journal ArticleDOI: 10.1016/J.VEHCOM.2017.01.002
Abstract: VANET is an emergent technology with promising future as well as great challenges especially in its security. In this paper, we focus on VANET security frameworks presented in three parts. The first presents an extensive overview of VANET security characteristics and challenges as well as requirements. These requirements should be taken into consideration to enable the implementation of secure VANET infrastructure with efficient communication between parties. We give the details of the recent security architectures and the well-known security standards protocols. The second focuses on a novel classification of the different attacks known in the VANET literature and their related solutions. The third is a comparison between some of these solutions based on well-known security criteria in VANET. Then we draw attention to different open issues and technical challenges related to VANET security, which can help researchers for future use.

... read more

322 Citations

No. of citations received by the Paper in previous years
Network Information
Related Papers (5)
Sybil attacks on vehicular Ad-Hoc networks14 Apr 2008

Shang Yeu Chang, Lin Yang +1 more

Attack Analysis in Vehicular Ad Hoc Networks23 Sep 2017

Omer Mintemur, Sevil Sen

A Taxonomy of Sybil Attacks in Vehicular Ad-Hoc Network (VANET)01 Jan 2020

Nirbhay Chaubey, Dhananjay Yadav

On the Sybil attack detection in VANET01 Oct 2007

G. Guette, Bertrand Ducourthial