Skip to main content

Cyber Attack Detection Algorithm Using Traffic Flow Theory

  • Conference paper
  • First Online:
Communication Technologies for Vehicles (Nets4Cars/Nets4Trains/Nets4Aircraft 2019)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 11461))

Included in the following conference series:

  • 415 Accesses

Abstract

Vehicular ad hoc networks (VANETs) are expected to play an important role in our lives. They will improve the traffic safety and bring about a revolution on the driving experience. However, these benefits are counterbalanced by possible attacks that threaten not only the vehicle’s security, but also passengers’ lives. One of the most common attacks is the Sybil attack, which is even more dangerous than others because it could be the starting point of many other attacks in VANETs. This paper proposes a distributed approach allowing the detection of Sybil attacks by using the traffic flow theory. The key idea here is that each vehicle will monitor its neighborhood in order to detect an eventual Sybil attack. This is achieved by a comparison between the real accurate speed of the vehicle and the one estimated using the V2V communications with vehicles in the vicinity. This estimated speed is obtained using the traffic flow fundamental diagram of the road’s portion where the vehicles are moving.

A mathematical model that evaluates the rate of Sybil attack detection according to the traffic density is proposed. Then, this model is validated through some numerical simulations conducted using MATLAB tool.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Al-Sultan, S., Al-Doori, M.M., Al-Bayatti, A.H., Zedan, H.: A comprehensive survey on vehicular Ad Hoc network. J. Netw. Comput. Appl. 31(37), 380–92 (2014)

    Article  Google Scholar 

  2. Maxwell, J.C.: A Treatise on Electricity and Magnetism, 3rd edn, vol. 2, pp. 68–73. Clarendon, Oxford (1892)

    Google Scholar 

  3. Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis defenses. In: Proceedings of International Symposium on Information Processing in Sensor Networks, pp. 259–268 (2004)

    Google Scholar 

  4. Pal, S., Mukhopadhyay, A.K., Bhattacharya, P.P.: Defending mechanisms against sybil attack in next generation mobile ad hoc networks. IETE Tech. Rev. 25(4), 209–214 (2008)

    Article  Google Scholar 

  5. Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. Spec. Issue Secur. Ad Hoc Sens. Netw. 15(1), 3968 (2007)

    Article  Google Scholar 

  6. Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing vehicular communications. IEEE Wirel. Commun. Mag. Spec. Issue InterVehicular Commun. 13(5), 815 (2006)

    Article  Google Scholar 

  7. Study on the Deployment of C-ITS in Europe: Final Report. https://ec.europa.eu/transport/sites/transport/files/2016-c-its-deployment-study-final-report.pdf

  8. Garip, M.T., Reiher, P., Gerla, M.: Ghost: concealing vehicular botnet communication in the VANET control channel. In: 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, pp. 1–6 (2016). https://doi.org/10.1109/IWCMC.2016.7577024

  9. Zeroual, A., Messai, N., Kechida, S., Hamdi, F.: A piecewise switched linear approach for traffic flow modeling. Int. J. Autom. Comput. 14, 729–741 (2017)

    Article  Google Scholar 

Download references

Acknowledgement

This work was made possible by EC Grant No. INEA/CEF/TRAN/A2014/1042281 from the INEA Agency for the SCOOP project. The statements made herein are solely the responsibility of the authors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marwane Ayaida .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ayaida, M., Messai, N., Najeh, S., Wilhelm, G. (2019). Cyber Attack Detection Algorithm Using Traffic Flow Theory. In: Hilt, B., Berbineau, M., Vinel, A., Jonsson, M., Pirovano, A. (eds) Communication Technologies for Vehicles. Nets4Cars/Nets4Trains/Nets4Aircraft 2019. Lecture Notes in Computer Science(), vol 11461. Springer, Cham. https://doi.org/10.1007/978-3-030-25529-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-25529-9_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-25528-2

  • Online ISBN: 978-3-030-25529-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics