Sybil Attack in Vehicular Ad Hoc Network

In the Sybil attack, a malicious vehicle advertises several unique identities. The adversary can either generate legal identities or impersonate other normal vehicles. The Sybil attackers have more communication and computation resources compared to genuine vehicles. The Sybil attacker is capable of eavesdropping on-going communications of its neighbors. In the case of decision making process, the attacker generates false report through its multiple fake identities to create negative impact on the final decision.

NS2 Solution

In any decision-making procedure based on reports sent from a number of individual vehicles, if an attacker succeeds in presenting multiple independent identities, it can launch Sybil attacks against honest vehicles where the attacker can inject multiple false reports via multiple identities into the final decision. Upon Sybil attacks happening, the final results may be biased due to the influence of false reports sent from attackers. Above attack scenario is simulated in ns-2.
  • Attacker that launches Sybil attack by generating multiple identities and its misbehavior can be modeled in ns2.

  • Attackers are modeled to have rich resource such as high energy in order to escape from resource testing.

  • Performance degradation due to Sybil attack can be observed by analyzing the trace file result

Related Titles:

  • Shan Chang, Yong Qi, Hongzi Zhu, Jizhong Zhao, and Xuemin (Sherman) Shen, “Footprint: Detecting Sybil Attacks in Urban Vehicular Networks” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 6, JUNE 2012.