361
Views
18
CrossRef citations to date
0
Altmetric
Articles

Detecting Sybil attacks in vehicular ad hoc networks

, &
Pages 69-79 | Received 15 Jan 2019, Accepted 08 May 2019, Published online: 20 May 2019

References

  • Hamdan S, Al-Qassas RS, Tedmori S. Comparative study on Sybil attack detection schemes. Int J Comput Technol. 2015;14:5869–5876. doi: 10.24297/ijct.v14i7.1898
  • Dabboussi A, Kouta R, Gaber J, et al. Analyzing the reliability for connected vehicles using qualitative approaches and quantitative methods. Safety and Reliability – Safe Societies in a Changing World. CRC Press; 2018. p. 2603–2610.
  • Qian Y, Moayeri N. Design of secure and application-oriented VANETs. Vehicular Technology Conference, 2008, VTC Spring 2008, IEEE; 2008.
  • Zhao Z, Guardalben L, Karimzadeh M, et al. Mobility prediction-assisted over-the-top edge prefetching for hierarchical VANETs. IEEE J Sel Areas Commun. 2018;36(8):1786–1801. doi: 10.1109/JSAC.2018.2844681
  • Newsome J, Shi E, Song D, et al. The Sybil attack in sensor networks: analysis & defenses. Proceedings of the Third International Symposium on Information Processing in Sensor Networks. ACM; 2004.
  • Jain M, Saxena R. VANET: security attacks, solution and simulation. Proceedings of the Second International Conference on Computational Intelligence and Informatics. Springer; 2018.
  • Rawat A, Sharma S, Sushil R. VANET: security attacks and its possible solutions. J Inf Oper Manage. 2012;3(1):301.
  • Al-Sultan S, Al-Doori MM, Al-Bayatti AH, et al. A comprehensive survey on vehicular ad hoc network. J Netw Comput Appl. 2014;37:380–392. doi: 10.1016/j.jnca.2013.02.036
  • Aboobaker AKK. Performance analysis of authentication protocols in vehicular ad hoc networks (VANET) [Master of Science thesis]. Department of Mathematics, University of London; 2010.
  • Patel A, Kaushik P. Improving QoS of VANET using adaptive CCA range and transmission range both for intelligent transportation system. Wirel Pers Commun. 2018;100(3):1063–1098. doi: 10.1007/s11277-018-5609-5
  • Sabahi F. The security of vehicular adhoc networks. 2011 Third International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN). IEEE; 2011.
  • Alasmary W, Zhuang W. Mobility impact in IEEE 802.11p infrastructureless vehicular networks. Ad Hoc Netw. 2012;10(2):222–230. doi: 10.1016/j.adhoc.2010.06.006
  • Rai AK, Tewari RR, Upadhyay SK. Different types of attacks on integrated MANETInternet communication. Int J Comput Sci Secur. 2010;4(3):265–274.
  • Porwal V, Patel R. A survey of VANETs: the platform for vehicular networking applications. Int J Adv Res Comput Eng Technol. 2014;3(8):2801–2805.
  • Dhamgaye A, Chavhan N. Survey on security challenges in VANET 1. Int J Comput Sci 2013;2:88–96.
  • Rawat A, Sharma S, Sushil R. VANET: security attacks and its possible solutions. J Inf Oper Manage. 2012;3(1):301–304.
  • Hasrouny H, Samhat AE, Bassil C, et al. VANet security challenges and solutions: a survey. Veh Commun. 2017;7:7–20.
  • Raya M, Hubaux J-P. The security of vehicular ad hoc networks. Proceedings of the Third ACM Workshop on Security of Ad hoc and Sensor Networks. ACM; 2005.
  • Grover J, Kumar D, Sargurunathan M, et al. Performance evaluation and detection of Sybil attacks in vehicular ad-hoc networks. Recent Trends in Network Security and Applications. Springer; 2010. p. 473–482.
  • Haseeb K, Arshad M, Yasin S, et al. A survey of VANET’s authentication. Pakistan: Islamia College Peshawar; 2010.
  • Yu B, Xu C-Z, Xiao B. Detecting Sybil attacks in vanets. J Parallel Distrib Comput. 2013;73(6):746–756. doi: 10.1016/j.jpdc.2013.02.001
  • Grover J, Gaur M, Laxmi V. Sybil attack in VANETs. Security of self-organizing networks: MANET, WSN, WMN, VANET. 2010, p. 269.
  • Park S, Aslam B, Turgut D, et al. Defense against Sybil attack in vehicular ad hoc network based on roadside unit support. Military Communications Conference, 2009. MILCOM 2009. IEEE; 2009.
  • Guette G, Ducourthial B. On the Sybil attack detection in VANET. IEEE International Conference on Mobile Adhoc and Sensor Systems, 2007. MASS 2007. IEEE; 2007.
  • Yan G, Olariu S, Weigle MC. Providing VANET security through active position detection. Comput Commun. 2008;31(12):2883–2897. doi: 10.1016/j.comcom.2008.01.009
  • Viswanath B, Mondal M, Clement A, et al. Exploring the design space of social network-based Sybil defenses. 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS). IEEE; 2012.
  • Xiao B, Yu B, Gao C. Detection and localization of Sybil nodes in VANETs. Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad hoc Networks and Sensor Networks. ACM; 2006.
  • Yan G, Yang W, Li J, et al. Active position security through dynamically tunable radar. 2010 IEEE 7th International Conference on Mobile Ad hoc and Sensor Systems (MASS). IEEE; 2010.
  • Rahbari M, Jamali MAJ. Efficient detection of Sybil attack based on cryptography in VANET. arXiv Preprint ArXiv:1112.2257. 2011.
  • Studer A, Shi E, Bai F, et al. TACKing together efficient authentication, revocation, and privacy in VANETs. 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad hoc Communications and Networks, 2009. SECON'09. IEEE; 2009.
  • Chang S, Qi Y, Zhu H, et al. Footprint: detecting Sybil attacks in urban vehicular networks. IEEE Trans Parallel Distrib Syst. 2012;23(6):1103–1114. doi: 10.1109/TPDS.2011.263
  • Park S, Aslam B, Turgut D, et al. Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support. Secur Commun Netw. 2013;6(4):523–538. doi: 10.1002/sec.679
  • Zhou T, Choudhury RR, Ning P, et al. P2DAP—Sybil attacks detection in vehicular ad hoc networks. IEEE J Sel Areas Commun. 2011;29(3):582–594. doi: 10.1109/JSAC.2011.110308
  • Rogaway P, Shrimpton T. Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. Fast Software Encryption. Springer; 2004.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.