Detecting Sybil Attack in Vehicular Ad Hoc Network

An attacker can forge multiple fake and distinct identities to cause disproportionately large impact. If a vehicle moves forward to a road side unit (RSU), the Sybil attacker actively demands an authorized message from RSU as the proof of the manifestation time at this particular RSU. Footprint is Sybil attack detection technique that uses the trajectories of vehicles for identification while ensuring the anonymity and location privacy of vehicles. In footprint, if a vehicle approaches an RSU, the RSU issues an authorized message for this vehicle as an evidence of its presence at this RSU and current time. This authorized messages helps in identifying the vehicles as the vehicles are located in various locations get different authorized messages.

NS2 Solution

  • Network Simulator (ns-2) is used for conducting the simulation to provide network animation and to evaluate the performance of the Footprint using the trace file generation.

  • The performance of Footprint is evaluated in recognizing forged trajectories (issued by malicious vehicles) and actual ones (provided by honest vehicles) through trace-driven simulations.

Related Titles:

  • Shan Chang, Yong Qi, Hongzi Zhu, Jizhong Zhao, and Xuemin (Sherman) Shen, “Footprint: Detecting Sybil Attacks in Urban Vehicular Networks” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 6, JUNE 2012