This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Sybil Attacks on Vehicular Ad-Hoc Networks
Technical Paper
2008-01-0770
ISSN: 0148-7191, e-ISSN: 2688-3627
Annotation ability available
Sector:
Language:
English
Abstract
Security is a huge concern in VANETs (Vehicular Ad hoc NETworks) since the information being conveyed may affect life-or-death decisions. One of the security concerns is the Sybil Attack. This attack attempts to create multiple identities to disrupt or control the network. A malicious node utilizing the Sybil Attack in VANETs can disrupt the network in various ways. It can create a large number of Sybil nodes to intervene in message forwarding, potentially causing a massive pileup and great loss of life. A malicious node can also use the Sybil Attack to create illusions of traffic congestions, getting other drivers to take alternate routes and leaving a clear path for the malicious node to its destination. In this paper, we discuss several defense strategies for the Sybil Attack in VANETs.
Recommended Content
Authors
Topic
Citation
Chang, S., Yang, L., and Guo, J., "Sybil Attacks on Vehicular Ad-Hoc Networks," SAE Technical Paper 2008-01-0770, 2008, https://doi.org/10.4271/2008-01-0770.Also In
References
- Capkun S. Hubaux J. “ Secure Positioning in Wireless Networks ,” IEEE Journal on Selected Areas in Communications 24 2 Feb. 2006 221 232
- Castro M. Druschel P. Ganesh A. Rowstron A. Wallach D. S. “ Secure Routing for Structured Peer-to-Peer Overlay Networks ,” SIGOPS Oper. Syst. Rev. 36 SI Dec. 2002 299 314
- Demirbas M. Song Y. “ An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks ,” Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks June 2006 564 570
- Douceur J. R. “ The Sybil Attack ,” First International Workshop on Peer-to-Peer Systems Mar. 2002 251 260
- Golle P. Greene D. Staddon J. “ Detecting and Correcting Malicious Data in VANETs ,” Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks Oct. 2004 29 37
- Leinmuller T. Maihofer C. Schoch E. Kargl F. “ Improved Security in Geographic Ad hoc Routing through Autonomous Position Verification ,” Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks Sept. 2006 57 66
- Newsome J. Shi E. Song D. Perrig A. “ The Sybil Attack in Sensor Networks: Analysis & Defenses ,” Proceedings of the Third International Symposium on Information Processing in Sensor Networks Apr. 2004 259 268
- Raya M. Hubaux J. “ The Security of Vehicular Ad Hoc Networks ,” Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks Nov. 2005 11 21
- Xiao B. Yu B. Gao C. “ Detection and Localization of Sybil Nodes in VANETs ,” Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks Sept. 2006 1 8