Skip to main content

Combating Sybil Attacks in Vehicular Ad Hoc Networks

  • Conference paper
Recent Trends in Wireless and Mobile Networks (CoNeCo 2011, WiMo 2011)

Abstract

Vehicular Ad Hoc Networks (VANETs) are considered as a promising approach for facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. However, they are subject to an attack that has a severe impact on their security. This attack is called the Sybil attack, and it is considered as one of the most serious attacks to VANETs, and a threat to lives of drivers and passengers. In this paper, we propose a detection scheme for the Sybil attack. The idea is based on public key cryptography and aims to ensure privacy preservation, confidentiality, and non-repudiation. In addition, we suggest a scalable security and privacy solution using short-lived and authenticated certificates that must be issued from the national certification authority in order to guarantee trust among vehicles.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhou, T., Choudhury, R.R., Ning, N., Chakrabarty, K.: Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks. In: Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems Networking&Services, MobiQuitous (2007)

    Google Scholar 

  2. Yu, H., Kaminsky, M., Gibbons, P., Flaxman, A.: Defending Against Sybil Attacks via Social Networks. In: Proceedings of the 2006 conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (2008)

    Google Scholar 

  3. Douceur, J.: The Sybil Attack in Peer-To-Peer Systems. In: Proceedings of First International Workshop on Peer-to-Peer Systems, March 7-8 (2002)

    Google Scholar 

  4. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks, Analysis & Defences. In: Third International Symposium on Information Processing in Sensor Networks, IPSN 2004 (2004)

    Google Scholar 

  5. Hubaux, J.P., Capkun, S., Luo, J.: The Security and Privacy of Smart Vehicles. IEEE Security and Privacy Magazine 2(3), 49–55 (2004)

    Article  Google Scholar 

  6. Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks (2007)

    Google Scholar 

  7. Guette, G., Bryce, C.: Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs). In: Proceedings of the 2nd IFIP WG 11.2 International Conference On Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks (2008)

    Google Scholar 

  8. Chen, C., Wang, X., Han, W., Zang, B.: A Robust Detection of the Sybil Attack in Urban VANETs. In: Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2009 (2009)

    Google Scholar 

  9. Park, S., Aslam, B., Turgut, D., Zou, C.: Defense Against Sybil Attack in Vehicular Ad Hoc Network-based on Roadside Unit Support. In: Proceedings of the 28th IEEE Conference on Military Communications (2009)

    Google Scholar 

  10. Wei, H., Huang, S., Vi, G., Xie, Z.: An Anonymity Improvement Scheme of Secure Electronic Transactions Protocols. In: 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE 2010) (2010)

    Google Scholar 

  11. Zhao, X., Wenyan, Z., Shanshan, C.: New Certificate Status Verification Scheme Based on OCSP for Wireless Environment. In: International Forum on Computer Science-Technology and Applications (2009)

    Google Scholar 

  12. El Zarki, M., Mehrotra, S., Tsudik, G., Venkatasubramanian, N.: Security Issues in A Future Vehicular Network. In: Euro Wireless Conference (2002)

    Google Scholar 

  13. Yan, G., Choudhary, G., Weigle, M., Olariu, S.: Providing VANET security through Active Position Detection. In: Proceedings of the Fourth ACM International Workshop On Vehicular Ad Hoc Networks (September 2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rabieh, K.M., Azer, M.A. (2011). Combating Sybil Attacks in Vehicular Ad Hoc Networks. In: Özcan, A., Zizka, J., Nagamalai, D. (eds) Recent Trends in Wireless and Mobile Networks. CoNeCo WiMo 2011 2011. Communications in Computer and Information Science, vol 162. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21937-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21937-5_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21936-8

  • Online ISBN: 978-3-642-21937-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics