Location based services in wireless ad hoc networks (original) (raw)
Related papers
Sybil Attack in Vanet by Neighbourhood Information Passing
In this paper, we will present one of the most applicable forms of Ad-Hoc networks; the Vehicular Ad-Hoc Networks (VANETs). VANET is the technology of building a robust Ad-Hoc network between mobile vehicles and each other, besides, between mobile vehicles and roadside units. It also demystifies some excerpts from the IEEE 802.11 standard that are related to the operation in the Ad-Hoc mode and illustrates the main points of its amendment in vehicular environments (IEEE 802.11p). Communications in wireless sensor networks are usually based on a unique identity that represents a network entity i.e. a node. Identities are used as an address to communicate with a network entity. In a Sybil attack a malicious node can generate and control a large number of logical identities on a single physical device. This gives the illusion to the network as if it were different legitimate nodes. A malicious device’s additional identities are known as Sybil nodes. This proposed work presents an algorithm to detect Sybil nodes having fabricated identities in a vehicular ad hoc network. Vehicular ad hoc network have many applications and if it is attacked by Sybil node then harmful situation can be created. To avoid this we have proposed a modified neighborhood algorithm for a city. The proposed algorithm checks the results for different sizes of blocks in the city and different number of Sybil nodes. For simulation purpose MATLAB has been used as a tool and inclusion of Sybil nodes number in the city is purely based on user’s desire. Results for different number of Sybil nodes will be checked for different block sizes of city
A Route map for Detecting Sybil Attacks in Urban Vehicular Networks
IJMER
Abstract: Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack, where a node illegitimately claims multiple identities. In urban vehicular networks, the location privacy of anonymous vehicles is highly concerned and anonymous verification of vehicles is indispensable. Consequently, an attacker who succeeds in forging multiple hostile identifies can easily launch a Sybil attack, gaining excessively large influence. In Vehicular Ad Hoc Networks (VANETs), the vehicular scenario requires smart signaling, smart road maintenance and other services. A brand new security issue is that the semi-trusted Road Side Units (RSUs) may be compromised. The objective of our work is to propose a Threshold ElGamal system based key management scheme for safeguarding VANET from the compromised RSUs and their collusion with the malicious vehicles. By analyzing the packet loss tolerance for security performance demonstration, followed by a discussion on the threshold our method can promote security with low overhead in Emergency Braking Notification and does not increase overhead in and Decentralized Floating Car Data during security promotion.
Detecting Sybil Attacks using Proofs of Work and Location in VANETs
International Journal of Scientific Research in Science, Engineering and Technology, 2023
Vehicular Ad-hoc Networks (VANETs) are gaining rapid momentum with the increasing number of vehicles on the road. VANETs are ad-hoc networks where vehicles exchange information about the traffic, road conditions to each other or to the road-side infrastructures. VANETs are characterized by high mobility and dynamic topology changes due to the high-speed vehicles in the network. These characteristics pose security challenges as vehicles can be conceded. It is critical to address security for the sake of protecting private data of vehicle and to avoid flooding of false data which defeats the purpose of VANETs. Sybil attack is one of the attacks where a vehicle fakes multiple vehicle identity to compromise the whole network. In this work, a direct trust manager is introduced which derives the trust value of each of its neighbor nodes at a regular interval of time. If the trust value is deviated, it confirms sybil attack. The proposed system is compared with the existing system to prove improved sybil attack detection ratio, thus providing better security. NS2 environment is used to prove the simulation results. The experimental results show that the attack detection ratio of SAD-V-DTC is 5 times better than that of the existing system. The packet delivery ratio shows an improvement of 27.27% while the false positive shows a good increase of 65.80% than the existing system.
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack, where a node illegitimately claims multiple identities. In urban vehicular networks, the location privacy of anonymous vehicles is highly concerned and anonymous verification of vehicles is indispensable. Consequently, an attacker who succeeds in forging multiple hostile identifies can easily launch a Sybil attack, gaining excessively large influence. In Vehicular Ad Hoc Networks (VANETs), the vehicular scenario requires smart signaling, smart road maintenance and other services. A brand new security issue is that the semi-trusted Road Side Units (RSUs) may be compromised. The objective of our work is to propose a Threshold ElGamal system based key management scheme for safeguarding VANET from the compromised RSUs and their collusion with the malicious vehicles. By analyzing the packet loss tolerance for security performance by PPI Algorithm demonstration, followed by a discussion on the threshold our method can promote security with low overhead in Emergency Braking Notification and does not increase overhead in and Decentralized Floating Car Data during security promotion.
Detecting Sybil attacks in vehicular networks
A Sybil attack consists of an adversary assuming multiple identities to defeat the trust of an existing reputation system. When Sybil attacks are launched in vehicular networks, the mobility of vehicles increases the difficulty of identifying the malicious vehicle location. In this paper, a novel protocol for Sybil detection in vehicular networks is presented. Considering that vehicular networks are cyber-physical systems, the technique exploits well grounded results in the physical (i.e., transportation) domain to detect the Sybil attacks in the cyber domain. Compared to existing works that rely on additional cyber hardware support, or complex cryptographic primitives for Sybil detection, the protocol leverages the theory of platoon dispersion that models the physics of naturally occurring vehicle dispersion. Specifically, the proposed technique employs a certain number of roadside units that periodically collect reports from vehicles regarding their physical neighborhood. Leveraging from existing models of platoon dispersion, a protocol was designed to detect anomalously close neighborhoods that are reflective of Sybil attacks. To the best of the authors' knowledge, this paper is unique in integrating a well established theory in transportation engineering for detecting cyber space attacks in vehicular networks. The resulting protocol is simple, efficient, and robust in diverse attack environments.
Detection of Sybil attack in vehicular ad hoc networks by analyzing network performance
International Journal of Electrical and Computer Engineering (IJECE), 2022
Vehicular ad hoc network (VANET) is an emerging technology which can be very helpful for providing safety and security as well as for intelligent transportation services. But due to wireless communication of vehicles and high mobility it has certain security issues which cost the safety and security of people on the road. One of the major security concerns is the Sybil attack in which the attacker creates dummy identities to gain high influence in the network that causes delay in some services and fake voting in the network to misguide others. The early detection of this attack can prevent people from being misguided by the attacker and save them from getting into any kind of trap. In this research paper, Sybil attack is detected by first applying the Poisson distribution algorithm to predict the traffic on the road and in the second approach, analysis of the network performance for packet delivery ratio (PDR) is performed in malign and benign environment. The simulation result shows that PDR decreases in presence of fake vehicles in the network. Our approach is simple and effective as it does not require high computational overhead and also does not violate the privacy issues of people in the network.
Detection of Sybil Attacks in Vehicular Ad Hoc Networks
Universal Journal of Communications and Network
Until recently vehicles and transportation systems were considered as the realm of mechanical engineers, but the need for the road safety and desire to be connected to the world, has broaden the industry scope. In order to do so Intelligent Transport System has been introduced and for few years, Vehicular Ad hoc Networks are getting much attention. The advance developments, wireless communication and life safety point towards to take into consideration the need of security in VANETs. In VANET, many attacks are possible and can cause serious damages to life. One such attack is Sybil attack. Sybil attacks have been regarded as a serious security threat to Ad hoc Networks and Sensor Networks. They may also damage the potential applications of Vehicular Ad hoc Networks (VANETs) by creating a deception of traffic congestion. Here we look on how the Sybil attack works and possible ways that an attacker can cause harm by launching these types of attacks in VANETS, along with the detection schemes that can be used to identify Sybil nodes and prevent the network from various hurtful effects.
L-P2DSA: Location-based privacy-preserving detection of Sybil attacks
2013 11th International Symposium on Programming and Systems (ISPS), 2013
In this paper we propose an approach that uses infrastructures and localization of nodes to detect Sybil attacks. Security and privacy are two major concerns in VANETs. Regrettably, most privacy-preserving schemes are prone to Sybil attacks, where a malicious user pretends to be multiple vehicles. L-P2DSA is an improvement to C-P²DAP [3], as it allows detecting Sybil attacks while reducing the load on the DMV. This is done due to the cooperation between adjacent RSUs to determine the location of suspicious nodes and measure a distinguishability degree between the positions of these malicious nodes. The detection in this manner doesn't need for any vehicle to disclose its identity; thus preserving privacy. The applicability of our contribution is validated through simulation of a realistic test case.
A Survey on Sybil Attack in Vehicular Ad-hoc Network
International Journal of Computer Applications, 2014
Vehicular Ad-hoc network is new and emerging technology. Researchers are gaining interest in this technology. Due to its open nature it is vulnerable to various attacks. Sybil attack is one of them. Various defense techniques have been given by researchers. In this work we briefly explain those defense techniques, given recently. We categorize these techniques as trusted certificates base, resource testing based and social network based. We give an overview of some defense schemes based on first two categories. We also give a summary of the techniques given in this paper, which is based on some parameters used in those techniques.
On Secure and Privacy-Aware Sybil Attack Detection in Vehicular Communications
2014
The foreseen dream of Vehicular Ad Hoc NETwork (VANET) deployment is obstructed by long-chased security and privacy nightmares. Despite of the increasing demand for perfect privacy, it conflicts with rather more serious security threat called ‘Sybil Attack’ which refers to, impersonation of one physical entity for many, namely Sybil nodes. In such circumstances, data received from malicious Sybil attacker may seem as if it was received from many distinct physical nodes. Sybil nodes may deliberately mislead other neighbors, resulting in catastrophic situations like traffic jams or even deadly accidents. Preventing such attacks in a privacy-enabled environment is not a trivial task. In this paper, we aim at two conflicting goals, i.e. privacy and Sybil attack in VANET. We leverage pseudonymless beaconing in order to preserve privacy. To cope with Sybil attack, we put forth a twofold strategy. In order to avoid Sybil attack through scheduled beacons, we employ tamper resistant module (TRM) to carry out a pre-assembly data analysis on data that is used to assemble beacons whereas for event reporting message (ERM), we employ road side units (RSUs) to localize Sybil nodes in VANET and report them to the revocation authority(s). RSUs distribute authorized tokens among the benign vehicular nodes which in turn are consumed to report ERMs. RSUs collect ERMs for certain event and figures out if more than one ERM for the same event includes identical token or, if an ERM is sent more than once by the same source. Our proposed scheme preserves privacy in both beacons and ERMs, and provides conditional anonymity where in case of a dispute; malicious attackers are subject to revocation. We also show that our proposed scheme outperforms the previously proposed scheme from security and computational complexity standpoint.