P2DAP - Sybil attacks detection in vehicular ad hoc networks

Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty

Research output: Contribution to journalArticlepeer-review


Vehicular ad hoc networks (VANETs) are being increasingly advocated for traffic control, accident avoidance, and management of parking lots and public areas. Security and privacy are two major concerns in VANETs. Unfortunately, in VANETs, most privacy-preserving schemes are vulnerable to Sybil attacks, whereby a malicious user can pretend to be multiple (other) vehicles. In this paper, we present a lightweight and scalable protocol to detect Sybil attacks. In this protocol, a malicious user pretending to be multiple (other) vehicles can be detected in a distributed manner through passive overhearing by s set of fixed nodes called road-side boxes (RSBs). The detection of Sybil attacks in this manner does not require any vehicle in the network to disclose its identity; hence privacy is preserved at all times. Simulation results are presented for a realistic test case to highlight the overhead for a centralized authority such as the DMV, the false alarm rate, and the detection latency. The results also quantify the inherent trade-off between security, i.e., the detection of Sybil attacks and detection latency, and the privacy provided to the vehicles in the network. From the results, we see our scheme being able to detect Sybil attacks at low overhead and delay, while preserving privacy of vehicles.

Original languageEnglish (US)
Article number5719270
Pages (from-to)582-594
Number of pages13
JournalIEEE Journal on Selected Areas in Communications
Issue number3
StatePublished - Mar 2011
Externally publishedYes


  • Coarse-grained hash
  • Fine-grained hash
  • Privacy
  • Security
  • Sybil attack
  • Vehicular ad hoc network

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering


Dive into the research topics of 'P2DAP - Sybil attacks detection in vehicular ad hoc networks'. Together they form a unique fingerprint.

Cite this