Abstract
Sybil attack can counterfeit traffic scenario by sending false messages with multiple identities, which often cause traffic jams and even lead to vehicular accidents in vehicular ad hoc network (VANET). It is very difficult to be defended and detected, especially when it is launched by some conspired attackers using their legitimate identities. In this paper, we propose an event based reputation system(EBRS), in which dynamic reputation and trusted value for each event are employed to suppress the spread of false messages. EBRS can detect Sybil attack with fabricated identities and stolen identities in the process of communication, it also defends against the conspired Sybil attack since each event has a unique reputation value and trusted value. Meanwhile, we keep the vehicle identity in privacy. Simulation results show that EBRS is able to defend and detect multi-source Sybil attacks with high performances.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Al-Sultan, S., Al-Doori, M.M., Al-Bayatti, A.H.: A comprehensive survey on vehicular Ad Hoc network. J. Netw. Comput. Appl. 37, 380–392 (2014)
Sumra, I.A., Hasbullah, H.B., AbManan, J.B.: Attacks on security goals (confidentiality, integrity, availability) in VANET: a survey. In: Laouiti, A., Qayyum, A., Mohamad, S., Mohamad, N. (eds.) Vehicular Ad-Hoc Networks for Smart Cities, pp. 51–61. Springer, Singapore (2015)
Wang, L.M., Li, X.J., Zhong, H.: A revocable group batch verification scheme for VANET. Sci. China: Inf. Sci. 43, 1307–1325 (2013)
Douceur, J.R.: The Sybil attack. In: Proceeding of International Workshop on Peer-to-Peer Systems, pp. 251–260, Cambridge (2002)
Bissmeyer, N., Stresing, C., Bayarou K.M.: Intrusion detection in VANETs through verification of vehicle movement data. In: Vehicular Networking Conference (VNC), pp. 166–173. IEEE press, New Jersey (2010)
Yu, B., Xu, C.Z., Xiao, B.: Detecting Sybil attacks in VANETs. J. Parall. Distrib. Comput. 73, 746–756 (2013)
Bouassida, M.S., Guette, G., Shawky, M.: Sybil nodes detection based on received signal strength variations within VANET. IJ Netw. Secur. 9, 22–33 (2009)
Chen, C., Wang, X., Han, W.L.: A robust detection of the Sybil attack in urban VANETs. In: The 29th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS 2009, pp. 270–276. IEEE press, Montreal (2009)
Park, S., Aslam, B., Turgut, D.: Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support. Secur. Commun. Netw. 6, 523–538 (2013)
Grover, J., Gaur, M.S., Laxmi, V.: A Sybil attack detection approach using neighboring vehicles in VANET. In: Proceeding of the 4th International Conference on Security of Information and Networks, pp. 151–158. ACM press, Sydney (2011)
Li, Z., Chigan, C.: On joint privacy and reputation assurance for vehicular ad hoc networks. IEEE Trans. Mob. Comput. 13, 2334–2344 (2014)
Chim, T.W., Yiu, S.M., Hui, L.C.K.: VSPN: VANET-based secure and privacy-preserving navigation. IEEE Trans. Comput. 63, 510–524 (2014)
Lo, N.W., Tsai, H.C.: A reputation system for traffic safety event on vehicular ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2009, 1–10 (2009)
Acknowledgments
This research was financially supported by National Natural Science Foundation of China under Grant An No.61472001 and No.U1405255.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Feng, X., Li, Cy., Chen, Dx., Tang, J. (2015). EBRS: Event Based Reputation System for Defensing Multi-source Sybil Attacks in VANET. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-21837-3_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21836-6
Online ISBN: 978-3-319-21837-3
eBook Packages: Computer ScienceComputer Science (R0)