Privacy-preserving detection of sybil attacks in vehicular ad hoc networks

Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Vehicular ad hoc networks (VANETs) are being advocated for traffic control, accident avoidance, and a variety of other applications. Security is an important concern in VANETs because a malicious user may deliberately mislead other vehicles and vehicular agencies. One type of malicious behavior is called a Sybil attack, wherein a malicious vehicle pretends to be multiple other vehicles. Reported data from a Sybil attacker will appear to arrive from a large number of distinct vehicles, and hence will be credible. This paper proposes a light-weight and scalable framework to detect Sybil attacks. Importantly, the proposed scheme does not require any vehicle in the network to disclose its identity, hence privacy is preserved at all times. Simulation results demonstrate the efficacy of our protocol.

Original languageEnglish (US)
Title of host publicationProceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems
Subtitle of host publicationComputing, Networking and Services, MobiQuitous 2007
DOIs
StatePublished - 2007
Externally publishedYes
Event4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2007 - Philadelphia, PA, United States
Duration: Aug 6 2007Aug 10 2007

Publication series

NameProceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2007

Other

Other4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2007
CountryUnited States
CityPhiladelphia, PA
Period8/6/078/10/07

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Privacy-preserving detection of sybil attacks in vehicular ad hoc networks'. Together they form a unique fingerprint.

Cite this