Abstract

A type of ad hoc network formed among moving vehicles that come in one another’s radio transmission range is called Vehicular Ad Hoc Network (VANET). VANET may be deployed using three architectures: pure ad hoc, WLAN and hybrid. Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) are the two modes in VANET used for communication among vehicles. These features not only distinguish a VANET from other ad hoc networks but also make these networks more exposed to attacks and increase their complexity. These networks being the primary mechanism for communication in VANETs, appropriate and timely delivery of information is of prime importance. Due to the existence of various vehicular traffic scenarios, a single category of routing protocols is not sufficient for the VANETs. Therefore, various categories of routing protocols have been tailored to meet specific kinds of routing requirements in this framework. Most significant ones are ad hoc/topology-based, position-based, geocast-based, cluster-based, broadcast-based protocols. There exist a number of attacks that apart from affecting various other parameters also affect the routing protocols in these VANETs. Most of these attacks may be launched in all the above-mentioned three architectures. But, one of the most dangerous attacks is the Sybil attack that may be initiated in pure ad hoc deployment of VANET where vehicles communicate with one another in one to one manner using carry forward approach. In this paper, with the help of illustrative example for each of the five categories of routing protocols, we show how Sybil attack affects these protocols. Considering the ad hoc scenarios in VANETs, we also discuss a prevention mechanism for the Sybil attack briefly.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call