A Novel Sybil Attack Detection Mechanism for C-ITS
Title | A Novel Sybil Attack Detection Mechanism for C-ITS |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Ayaida, Marwane, Messai, Nadhir, Wilhelm, Geoffrey, Najeh, Sameh |
Conference Name | 2019 15th International Wireless Communications Mobile Computing Conference (IWCMC) |
ISBN Number | 978-1-5386-7747-6 |
Keywords | Accidents, C-ITS, composability, Computational modeling, computer network security, cooperative intelligent transport systems, detection algorithm, driving experience, intelligent transportation systems, ITS, Mathematical model, Metrics, NS3 network simulator, Protocols, pubcrawl, Public key, resilience, Resiliency, road safety, road traffic, road vehicles, Roads, roads portion, SUMO traffic simulator, Sybil attack, sybil attacks, traffic flow theory, traffic model, Traffic Safety, V2V communications, vehicles security, vehicular ad hoc networks |
Abstract | Cooperative Intelligent Transport Systems (C-ITS) are expected to play an important role in our lives. They will improve the traffic safety and bring about a revolution on the driving experience. However, these benefits are counterbalanced by possible attacks that threaten not only the vehicle's security, but also passengers' lives. One of the most common attacks is the Sybil attack, which is even more dangerous than others because it could be the starting point of many other attacks in C-ITS. This paper proposes a distributed approach allowing the detection of Sybil attacks by using the traffic flow theory. The key idea here is that each vehicle will monitor its neighbourhood in order to detect an eventual Sybil attack. This is achieved by a comparison between the real accurate speed of the vehicle and the one estimated using the V2V communications with vehicles in the vicinity. The estimated speed is derived by using the traffic flow fundamental diagram of the road's portion where the vehicles are moving. This detection algorithm is validated through some extensive simulations conducted using the well-known NS3 network simulator with SUMO traffic simulator. |
URL | https://ieeexplore.ieee.org/document/8766572 |
DOI | 10.1109/IWCMC.2019.8766572 |
Citation Key | ayaida_novel_2019 |
- resilience
- vehicular ad hoc networks
- vehicles security
- V2V communications
- Traffic Safety
- traffic model
- traffic flow theory
- sybil attacks
- Sybil attack
- SUMO traffic simulator
- roads portion
- Roads
- road vehicles
- road traffic
- road safety
- Resiliency
- Accidents
- Public key
- pubcrawl
- Protocols
- NS3 network simulator
- Metrics
- Mathematical model
- ITS
- Intelligent Transportation Systems
- driving experience
- detection algorithm
- cooperative intelligent transport systems
- computer network security
- Computational modeling
- composability
- C-ITS