An Efficient Method for Detection of Sybil Attackers in IOV

An Efficient Method for Detection of Sybil Attackers in IOV

Satya Sandeep KanumalliAnuradha Ch Patanala Sri Rama Chandra Murty

Research Scholar, CSE Department, Vignan’s Nirula Institute of Technology & Science for Women, Acharya Nagarjuna University, Guntur 522009, India

CSE Department, Velagapudi Ramakrishna Sidhartha Engineering College, Vijayawada 52007, India

CSE Department, Acharya Nagarjuna University, Guntur 522510, India

Corresponding Author Email: 
satyasandeepk@gmail.com
Page: 
5-8
|
DOI: 
https://doi.org/10.18280/ama_b.610102
Received: 
2 Fabruary 2018
| |
Accepted: 
10 March 2018
| | Citation

OPEN ACCESS

Abstract: 

Brave new world was emerging and chancing its face day by day with the advent of IOT, as a part of it we have IOV which may change the way we are driving our vehicles leading to Autonomous driving, As there is a lot of Buzz on these trends they also comes with security threats of different forms in which Sybil Attack is one in which a malicious vehicle may create multiple identities to a Real one, with which he may circumvent different forms of attacks, We proposed an approach in which we divide the vehicles in to different clusters with their location information and certificate and filter the Sybil nodes with an idea no two nodes with the same identities will have different location ID’s or may fall in different clusters at the same time.

Keywords: 

internet of things, internet of vehicles, sybil nodes, K-means, RSU, on board unit, DSRC

1. Introduction
2. Related Work
3. System Model
4. Proposed Work
5. Simulation Results
6. Conclusion and Future Work
  References

[1] Feng X, et al. (2017). A method for defensing against multi-source Sybil attacks in VANET. Peer-to-Peer Networking and Applications 10(2): 305-314.

[2] Feng X, Jin T. (2017). Obfuscated RSUs vector based signature scheme for detecting conspiracy Sybil attack in VANETs. Mobile Information Systems.

[3] Sun YC, et al. (2017). Attacks and countermeasures in the internet of vehicles. Annals of Telecommunications 72(5-6): 283-295.

[4] Sowattana C, Wantanee Viriyasitavat, Assadarat Khurat. (2017). Distributed consensus-based Sybil nodes detection in VANETs. Computer Science and Software Engineering (JCSSE), 2017 14th International Joint Conference on. IEEE.

[5] Yao Y, et al. (2017). Voiceprint: a novel Sybil attack detection method based on RSSI for VANETs. Dependable Systems and Networks (DSN), 2017 47th Annual IEEE/IFIP International Conference on. IEEE.

[6] Rabieh K, et al. (2015). Cross-layer scheme for detecting large-scale colluding Sybil attack in VANETs. Communications (ICC), 2015 IEEE International Conference on. IEEE.

[7] Gu, PWL, et al. (2016). Vehicle driving pattern based Sybil attack detection. High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 2016 IEEE 18th International Conference on. IEEE.

[8] Chang S, et al. (2012). Footprint: Detecting Sybil attacks in urban vehicular networks. IEEE Transactions on Parallel and Distributed Systems 23(6): 1103-1114.

[9] Grover J, Manoj SG, Vijay L. (2015). Multivariate verification for Sybil attack detection in VANET. Open Computer Science5(1)1.

[10] Hussain R, Heekuck O. (2014). On secure and privacy-aware Sybil attack detection in vehicular communications. Wireless Personal Communications 77(4): 2649-2673.

[11] Kang JW, et al. (2016). Location privacy attacks and defenses in cloud-enabled internet of vehicles. IEEE Wireless Communications 23(5): 52-59.

[12] Liu YB, Wang YH, Chang GH. (2017). Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm. IEEE Transactions on Intelligent Transportation Systems 18(10): 2740-2749.

[13] Sakiz F, Sevil S. (2017). A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Networks 61: 33-50.

[14] Li W, Joshi A, Finin T. SVM-case: ANSVM-based context aware security framework for vehicular ad-hoc networks. In: 82nd IEEE Vehicular Technology Conference. IEEE 

[15] Sun YC, et al. (2014). Constructing the web of events from raw data in the web of things. Mobile Information Systems 10(1): 105-125.

[16]  Al-Sultan S, et al. (2014). A comprehensive survey on vehicular ad hoc network. Journal of Network and Computer Applications 37: 380-392.

[17] Sowattana C, WantaneeViriyasitavat, and AssadaratKhurat. (2017). Distributed consensus-based Sybil nodes detection in VANETs. Computer Science and Software Engineering (JCSSE), 2017 14th International Joint Conference on. IEEE.

[18] Pattberg B. (2015). DLR-Institute of transportation systems-SUMO–simulation of urban mobility. Sumo-sim. org.

[19] Khatoun R, Zeadally S. (2016). Smart cities: Concepts, architectures, research opportunities. Communications of the ACM 59(8): 46-57.

[20] Khadige A, Zhuang WH. (2014). Stochastic analysis of a single-hop communication link in vehicular ad hoc networks. IEEE transactions on intelligent transportation systems 15(5): 2297-2307.

[21] Gerla M, et al. (2014). Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds. Internet of Things (WF-IoT), 2014 IEEE World Forum on. IEEE.

[22] Yan SH, et al. (2014). Optimal information-theoretic wireless location verification. IEEE Transactions on Vehicular Technology 63(7): 3410-3422.

[23] Bhargava BK, et al. (2016). A systematic approach for attack analysis and mitigation in V2V Networks. JoWUA 7(7): 79-96.

[24] Jain AK. (2010). Data clustering: 50 years beyond K-means. Pattern recognition letters 31(8): 651-666.

[25] Likas A, Vlassis N, Verbeek JJ. (2003). The global k-means clustering algorithm. Pattern Recognition 36(2): 451-461.

[26] Mahamed GHO, Salman A, Engelbrecht AP. (2006). Dynamic clustering using particle swarm optimization with application in image segmentation. Pattern Analysis and Applications 8(4): 332.

[27] Shafeeq A, Hareesha KS. (2012). Dynamic clustering of data with modified k-means algorithm. Proceedings of the 2012 conference on information and computer networks.

[28] Kenney JB. (2011). Dedicated short-range communications (DSRC) standards in the United States. Proceedings of the IEEE 99(7): 1162-1182.

[29] Eckhoff D, Sommer C. (2012). A multi-channel IEEE 1609.4 and 802.11 p EDCA model for the veins framework. Proceedings of 5th ACM/ICST international conference on simulation tools and techniques for communications, networks and systems: 5th ACM/ICST international workshop on OMNet++. Desenzano, Italy, 19-23.