scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

On the Sybil attack detection in VANET

01 Oct 2007-pp 1-6
TL;DR: This paper proposes a precise quantification of the effects of various assumptions (type of antenna, transmission signal strength) on the effectiveness of a Sybil attack.
Abstract: Since few years, Vehicular Ad hoc Networks deserve much attention. The development of wireless communication in VANET implies to take into account the need of security. In VANET, many attacks rely on having the attacker generate multiple identities to simulate multiple nodes: this is called the Sybil attack. In this paper, we propose a precise quantification of the effects of various assumptions (type of antenna, transmission signal strength) on the effectiveness of a Sybil attack.
Citations
More filters
Journal ArticleDOI
TL;DR: This paper defines three types of Sybil attacks: SA-1, SA-2, and SA-3 according to the Sybil attacker's capabilities, and presents some Sybil defense schemes, including social graph-based Sybil detection (SGSD), behavior classification-basedSybil Detection (BCSD), and mobile Sybil Detection with the comprehensive comparisons.
Abstract: The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the IoT and even disseminate spam. In this paper, we survey Sybil attacks and defense schemes in IoT. Specifically, we first define three types Sybil attacks: SA-1, SA-2, and SA-3 according to the Sybil attacker’s capabilities. We then present some Sybil defense schemes, including social graph-based Sybil detection (SGSD), behavior classification-based Sybil detection (BCSD), and mobile Sybil detection with the comprehensive comparisons. Finally, we discuss the challenging research issues and future directions for Sybil defense in IoT.

308 citations


Cites methods from "On the Sybil attack detection in VA..."

  • ...Without the global social graph for Sybil detection, MSD aims to either detect SA-3 or restrict Sybil attacker’s behaviors....

    [...]

Journal ArticleDOI
01 Jun 2017
TL;DR: This paper aims to survey possible attacks against VANETs and the corresponding detection mechanisms that are proposed in the literature, and presents a holistic view of the solutions surveyed.
Abstract: Vehicular ad hoc networks (VANETs) have become one of the most promising and fastest growing subsets of mobile ad hoc networks (MANETs). They are comprised of smart vehicles and roadside units (RSU) which communicate through unreliable wireless media. By their very nature, they are very susceptible to attacks which may result in life-endangering situations. Due to the potential for serious consequences, it is vital to develop security mechanisms in order to detect such attacks against VANETs. This paper aims to survey such possible attacks and the corresponding detection mechanisms that are proposed in the literature. The attacks are classified and explained along with their effects, and the solutions are presented together with their advantages and disadvantages. An evaluation and summary table which provides a holistic view of the solutions surveyed is also presented.

269 citations


Cites background from "On the Sybil attack detection in VA..."

  • ...A study on the effectiveness of using signal strength distribution to detect the attack is given in [31], and [32] shows that the type of antenna in use has a remarkable effect on detection....

    [...]

Proceedings ArticleDOI
01 Dec 2012
TL;DR: This paper presents several existing security attacks and approaches to defend against them, and discusses possible future security attacks with critical analysis and future research possibilities.
Abstract: Vehicular Ad hoc Networks (VANETs) are emerging mobile ad hoc network technologies incorporating mobile routing protocols for inter-vehicle data communications to support intelligent transportation systems. Among others security and privacy are major research concerns in VANETs due to the frequent vehicles movement, time critical response and hybrid architecture of VANETs that make them different than other Ad hoc networks. Thus, designing security mechanisms to authenticate and validate transmitted message among vehicles and remove adversaries from the network are significantly important in VANETs. This paper presents several existing security attacks and approaches to defend against them, and discusses possible future security attacks with critical analysis and future research possibilities.

238 citations

Journal ArticleDOI
Wai Chen1, Ratul K. Guha1, Taek Jin Kwon1, John Lee1, Yuan-Ying Hsu1 
01 Jul 2011
TL;DR: This paper surveys recent results in VANET data dissemination into three broad categories: geocast/broadcast, multicast, and unicast approaches; and describes key ideas of representative technologies in each category.
Abstract: In this paper, we survey recent results in vehicular ad hoc networks (VANETs) data dissemination. We describe methods proposed to enforce dissemination scope such as geocast/broadcast and multicast. A growing category consisting of methods designed to achieve disruption tolerance in vehicular networks is presented. We describe the key ideas of representative technologies in each category. In addition, we consider location service and security issues that are crucial for data dissemination in VANET. We conclude by sharing our thoughts on further challenges. Copyright © 2009 John Wiley & Sons, Ltd.

197 citations


Cites background from "On the Sybil attack detection in VA..."

  • ...Position-related attacks include location falsification and sybil attack [43]....

    [...]

  • ...For sybil attack, reference [43] found that the...

    [...]

Journal ArticleDOI
TL;DR: A lightweight authentication protocol for RFID (Radio-Frequency Identification devices) has been proposed to overcome the drawbacks of existing solutions and to provide better performance in terms of low detection time, low CPU and memory consumption to strengthen the existing IoV environment.

188 citations

References
More filters
Book ChapterDOI
John R. Douceur1
07 Mar 2002
TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Abstract: Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these "Sybil attacks" is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.

4,816 citations


"On the Sybil attack detection in VA..." refers background or methods in this paper

  • ...1) The Sybil attack: The Sybil attack was first described and formalized by Douceur in [4]....

    [...]

  • ...The method described in [4] uses computational puzzles [7] to test nodes computational resources....

    [...]

  • ...2) Resources testing: [4] and [8] propose resources testing as a defense against Sybil attack....

    [...]

  • ...The multiplication of fake nodes in a wireless network in order to launch different kind of attack is known as the Sybil attack [4]....

    [...]

  • ...One important result shown in [4] is that without a logically centralized authority, Sybil attacks are always possible (i....

    [...]

Journal ArticleDOI
01 Jan 2007
TL;DR: This paper provides a set of security protocols, it is shown that they protect privacy and it is analyzed their robustness and efficiency, and describes some major design decisions still to be made.
Abstract: Vehicular networks are very likely to be deployed in the coming years and thus become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made, which in some cases have more than mere technical implications. We provide a set of security protocols, we show that they protect privacy and we analyze their robustness and efficiency.

1,550 citations

Proceedings ArticleDOI
26 Apr 2004
TL;DR: It is demonstrated that the Sybil attack can be exceedingly detrimental to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc.
Abstract: Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack based on J.R. Douceur (2002), where a node illegitimately claims multiple identities. This paper systematically analyzes the threat posed by the Sybil attack to wireless sensor networks. We demonstrate that the attack can be exceedingly detrimental to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc. We establish a classification of different types of the Sybil attack, which enables us to better understand the threats posed by each type, and better design countermeasures against each type. We then propose several novel techniques to defend against the Sybil attack, and analyze their effectiveness quantitatively.

1,402 citations

Proceedings ArticleDOI
07 Nov 2005
TL;DR: A set of security protocols are provided, it is shown that they protect privacy and the robustness of these protocols are analyzed, and a quantitative assessment of the proposed solution is carried out.
Abstract: Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made, which in some cases have more than mere technical implications. We provide a set of security protocols, we show that they protect privacy and we analyze their robustness, and we carry out a quantitative assessment of the proposed solution.

1,104 citations

Book ChapterDOI
02 Jan 1994
TL;DR: The "distance bounding" technique is introduced, which solves the problem of timing the delay between sending out a challenge bit and receiving back the corresponding response bit and can be integrated into common identification protocols.
Abstract: It is often the case in applications of cryptographic protocols that one party would like to determine a practical upper-bound on the physical distance to the other party. For instance, when a person conducts a cryptographic identification protocol at an entrance to a building, the access control computer in the building would like to be ensured that the person giving the responses is no more than a few meters away. The "distance bounding" technique we introduce solves this problem by timing the delay between sending out a challenge bit and receiving back the corresponding response bit. It can be integrated into common identification protocols. The technique can also be applied in the three-party setting of "wallets with observers" in such a way that the intermediary party can prevent the other two from exchanging information, or even developing common coinflips.

817 citations


"On the Sybil attack detection in VA..." refers methods in this paper

  • ...In [3], the authors present a novel approach called verifiable multilateration, using distance bounding protocol [ 2 ] and base stations to provide secure positioning....

    [...]