Comparative Study on Sybil Attack Detection Schemes

نویسندگان

  • S. Hamdan
  • R. S. Al-Qassas
  • S. Tedmori
چکیده

Vehicular Ad Hoc Network (VANET) is a wireless network formed between a collection of vehicles connected through wireless connections. VANETs can help increase the passengers‟ comfort, safety, efficiency and convenience by providing them with information about the ongoing road status and other relevant road information. VANETs, similar to other networks, face numerous security threats. One such threat is the Sybil attack, a critical threat that can impair the proper functioning of VANETs. In a Sybil attack, a malicious node illegitimately claims multiple identities and simultaneously exploits these fake identities in order to disturb the functionality of the VANET by disseminating false information. In the presence of a Sybil node, any kind of attack can be launched on the VANET. This paper provides a comprehensive review and comparison of the different techniques that have been proposed in the literature to prevent or reduce the adverse effects of Sybil attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

A Physical Measurement-Based Sybil Nodes Detection Mechanism in VANETs

In traffic safety applications of Vehicular Ad-hoc Networks (VANETs), security is a very important issue. Sybil attack is a particular attack where the attacker illegitimately claims multiple identities. In the past, several approaches have been proposed to solve this problem. They are categorized into PKI-based, infrastructure-based, observer-based, and resourcetesting-based schemes. In this p...

متن کامل

Detection of Sybil Attacks in Vehicular Ad hoc Networks Based on Road Side Unit Support

Until recently vehicles and transportation systems were considered as the realm of mechanical engineers, but the need for the road safety and desire to be connected to the world, has broaden the industry scope. In order to do so Intelligent Transport System has been introduced and for few years, Vehicular Ad hoc Networks are getting much attention. The advance developments, wireless communicati...

متن کامل

Towards trustworthy social computing systems

The rising popularity of social computing systems has managed to attract rampant forms of service abuse that negatively affects the sustainability of these systems and degrades the quality of service experienced by their users. The main factor that enables service abuse is the weak identity infrastructure used by most sites, where identities are easy to create with no verification by a trusted ...

متن کامل

A Survey on Security Challenges and Malicious Vehicle Detection in Vehicular Ad Hoc Networks

In Vehicular Ad hoc Networks (VANETs), vehicles periodically broadcast messages for every 100 to 300 milli seconds. Such messages are used to report a safety or non-safety application. Authentication on such safety messages assures the end users in the network. However, a malicious vehicle can trace the messages and can launch varied types of malicious activity which leads to the compromise of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015