2011
DOI: 10.5120/3704-5192
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Sybil Attack Detection in VANET

Abstract: Security and Privacy are among the most important concerns in Vehicular Ad-hoc Networks (VANET). Widely accepted privacy preserving communication scheme in VANETcommunity -that is using pseudonyms -has left open doors for some security problems such as Sybil attack. In this paper, we have proposed an efficient approach detecting this attack while preserving privacy of vehicles in the network.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…Many forms of security attacks (For e.g., Botnet [15], Man in middle attack, Sybil, etc.,) against VANETs have emerged which could impair the life safety, or loss of income for the implemented value-added services [4]. Among these attacks, Sybil attack, Copyright ⓒ 2015 SERSC which consists in sending messages with multiple forged identities [9]. A Sybil attacker could: a) disturb the generation of routes when a multipath or geographic routing algorithm is used, by appearing in several places in the generated routes; b) affect the results of data aggregation by contributing to the process of aggregation several times; c) evade detection while behaving maliciously by spreading the actions he executes over the forged identities; d) prevent the network from guaranteeing the fairness of resources by claiming several identities and receiving a high percentage of shared resources [11].…”
Section: Introductionmentioning
confidence: 99%
“…Many forms of security attacks (For e.g., Botnet [15], Man in middle attack, Sybil, etc.,) against VANETs have emerged which could impair the life safety, or loss of income for the implemented value-added services [4]. Among these attacks, Sybil attack, Copyright ⓒ 2015 SERSC which consists in sending messages with multiple forged identities [9]. A Sybil attacker could: a) disturb the generation of routes when a multipath or geographic routing algorithm is used, by appearing in several places in the generated routes; b) affect the results of data aggregation by contributing to the process of aggregation several times; c) evade detection while behaving maliciously by spreading the actions he executes over the forged identities; d) prevent the network from guaranteeing the fairness of resources by claiming several identities and receiving a high percentage of shared resources [11].…”
Section: Introductionmentioning
confidence: 99%