EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Impact of radio irregularity on wireless sensor networks
Proceedings of the 2nd international conference on Mobile systems, applications, and services
The Security and Privacy of Smart Vehicles
IEEE Security and Privacy
Detecting and correcting malicious data in VANETs
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
MDDV: a mobility-centric data dissemination algorithm for vehicular networks
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Urban multi-hop broadcast protocol for inter-vehicle communication systems
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks
Fair sharing of bandwidth in VANETs
Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Challenges of intervehicle ad hoc networks
IEEE Transactions on Intelligent Transportation Systems
Providing VANET security through active position detection
Computer Communications
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Distributed misbehavior detection in VANETs
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Interactive detection of network anomalies via coordinated multiple views
Proceedings of the Seventh International Symposium on Visualization for Cyber Security
A novel defense mechanism against sybil attacks in VANET
Proceedings of the 3rd international conference on Security of information and networks
Defense against Sybil attack in vehicular ad hoc network based on roadside unit support
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
VWCA: An efficient clustering algorithm in vehicular ad hoc networks
Journal of Network and Computer Applications
Security in vehicular adhoc networks: a survey
Proceedings of the 2011 International Conference on Communication, Computing & Security
Hierarchical IP distribution mechanism for VANET
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume Part III
Sybil attack detection based on signature vectors in VANETs
International Journal of Critical Computer-Based Systems
Journal of Network and Computer Applications
A sybil attack detection approach using neighboring vehicles in VANET
Proceedings of the 4th international conference on Security of information and networks
Central misbehavior evaluation for VANETs based on mobility data plausibility
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications
Detecting Sybil attacks in VANETs
Journal of Parallel and Distributed Computing
Privacy representation in VANET
Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Hi-index | 0.00 |
Sybil attacks have been regarded as a serious security threat to ad hoc networks and sensor networks. They may also impair the potential applications of VANETs (Vehicular Ad hoc Networks) by creating an illusion of traffic congestion. In this paper, we present a lightweight security scheme for detecting and localizing Sybil nodes in VANETs, based on statistic analysis of signal strength distribution. Our scheme is a distributed and localized approach, in which each vehicle on a road can perform the detection of potential Sybil vehicles nearby by verifying their claimed positions. We first introduce a basic signal-strength-based position verification scheme. However, the basic scheme proves to be inaccurate and vulnerable to spoof attacks. In order to compensate for the weaknesses of the basic scheme, we propose a technique to prevent Sybil nodes from covering up for each other. In this technique, traffic patterns and support from roadside base stations are used to our advantage. We, then, propose two statistic algorithms to enhance the accuracy of position verification. The algorithms can detect potential Sybil attacks by observing the signal strength distribution of a suspect node over a period of time. The statistic nature of our algorithms significantly reduces the verification error rate. Finally, we conduct simulations to explore the feasibility of our scheme.