2014
DOI: 10.1186/2196-064x-1-4
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Sybil attacks in vehicular networks

Abstract: A Sybil attack consists of an adversary assuming multiple identities to defeat the trust of an existing reputation system. When Sybil attacks are launched in vehicular networks, the mobility of vehicles increases the difficulty of identifying the malicious vehicle location. In this paper, a novel protocol for Sybil detection in vehicular networks is presented. Considering that vehicular networks are cyber-physical systems, the technique exploits well grounded results in the physical (i.e., transportation) doma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 31 publications
0
6
0
Order By: Relevance
“…This takes place through periodic messages, which the attacker tries to jam. It is this jamming that affects the vehicles' ability to achieve the platoon [13]. Lyamin et al, proposed an algorithm for detecting denial of service attacks in real-time based on some performance metrics such as the percentage of false alarms for any jamming channel and the average beacon time for vehicular ad hoc networks [14].…”
Section: Related Workmentioning
confidence: 99%
“…This takes place through periodic messages, which the attacker tries to jam. It is this jamming that affects the vehicles' ability to achieve the platoon [13]. Lyamin et al, proposed an algorithm for detecting denial of service attacks in real-time based on some performance metrics such as the percentage of false alarms for any jamming channel and the average beacon time for vehicular ad hoc networks [14].…”
Section: Related Workmentioning
confidence: 99%
“…In [22], Mutaz et al investigate the traffic of vehicles which always submit reports to RSU. This scheme is unique because of its approach in exploiting model of physical parameters on transportation engineering, e.g., platoon dispersion, speed of vehicles, etc., and also combining with Sybil attack detection schemes, which are similar with [23] and [24] in some way to verify physical presence of the vehicles.…”
Section: A Authentication Of Entitiesmentioning
confidence: 99%
“…We consider that malicious vehicles can modify transaction records and eavesdrop on communication channels to trace a particular vehicle. Considering vehicular network constraints and also less number of vehicles in a rural area, we can imagine that in such a situation, adversaries are likely to launch the Sybil attack, i.e., an attack which is done by an entity that possesses multiple identities, either legitimate or fraudulent, as discussed in several previous works [22], [19].…”
Section: Security Analysismentioning
confidence: 99%
“…Vehicular ad hoc networks are susceptible to many types of security threats that not only deteriorate the performance of the network, but could also lead to traffic accidents. The possible security threats include eavesdropping [157], [158], sybil attack [159], message spoofing and falsification [160], [161] and many other types of attacks [162], [163].…”
Section: G Impact Of Mmwave Communication On Security Issuesmentioning
confidence: 99%