Abstract

Vehicular <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">ad hoc</i> networks (VANETs) have far-reaching application potentials in the intelligent transportation system (ITS) such as traffic management, accident avoidance and in-car infotainment. However, security has always been a challenge to VANETs, which may cause severe harm to the ITS. Sybil attack is considered as a serious security threat to VANETs since the adversary can disseminate false messages with multiple forged identities to attack various applications in the ITS. RSSI-based Sybil nodes detection is an efficient scheme against Sybil attacks, which adopts position estimation, distribution verification or similarity comparison to identify Sybil nodes. However, when Sybil nodes conduct power control to deliberately change transmission powers, the received RSSI values would change correspondingly, which leads to inaccurate localization or different RSSI time series of these Sybil nodes. Thus, it is very difficult to differentiate Sybil nodes from normal nodes via conventional RSSI-based methods. This paper first discusses potential power control models (PCMs) for launching Sybil attacks in VANETs, then presents two simple Sybil attack models and three sophisticated Sybil attack ones with or without power control in detail, finally proposes a power control identification Sybil attack detection (PCISAD) scheme to find anomalous variations in RSSI time series, which are then used to identify Sybil nodes via a linear SVM classifier. Extensive simulations and real-world experiments prove that the proposed scheme can effectively deal with Sybil attacks with power control.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call