Visible to the public A Novel Sybil Attack Detection Mechanism for C-ITS

TitleA Novel Sybil Attack Detection Mechanism for C-ITS
Publication TypeConference Paper
Year of Publication2019
AuthorsAyaida, Marwane, Messai, Nadhir, Wilhelm, Geoffrey, Najeh, Sameh
Conference Name2019 15th International Wireless Communications Mobile Computing Conference (IWCMC)
ISBN Number978-1-5386-7747-6
KeywordsAccidents, C-ITS, composability, Computational modeling, computer network security, cooperative intelligent transport systems, detection algorithm, driving experience, intelligent transportation systems, ITS, Mathematical model, Metrics, NS3 network simulator, Protocols, pubcrawl, Public key, resilience, Resiliency, road safety, road traffic, road vehicles, Roads, roads portion, SUMO traffic simulator, Sybil attack, sybil attacks, traffic flow theory, traffic model, Traffic Safety, V2V communications, vehicles security, vehicular ad hoc networks
Abstract

Cooperative Intelligent Transport Systems (C-ITS) are expected to play an important role in our lives. They will improve the traffic safety and bring about a revolution on the driving experience. However, these benefits are counterbalanced by possible attacks that threaten not only the vehicle's security, but also passengers' lives. One of the most common attacks is the Sybil attack, which is even more dangerous than others because it could be the starting point of many other attacks in C-ITS. This paper proposes a distributed approach allowing the detection of Sybil attacks by using the traffic flow theory. The key idea here is that each vehicle will monitor its neighbourhood in order to detect an eventual Sybil attack. This is achieved by a comparison between the real accurate speed of the vehicle and the one estimated using the V2V communications with vehicles in the vicinity. The estimated speed is derived by using the traffic flow fundamental diagram of the road's portion where the vehicles are moving. This detection algorithm is validated through some extensive simulations conducted using the well-known NS3 network simulator with SUMO traffic simulator.

URLhttps://ieeexplore.ieee.org/document/8766572
DOI10.1109/IWCMC.2019.8766572
Citation Keyayaida_novel_2019