About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
4th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services

Research Article

Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/MOBIQ.2007.4451013,
        author={Tong Zhou and Romit Roy Choudhury and Peng Ning and Krishnendu Chakrabarty},
        title={Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks},
        proceedings={4th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services},
        publisher={IEEE},
        proceedings_a={MOBIQUITOUS},
        year={2008},
        month={2},
        keywords={Ad hoc networks  Data security  Privacy  Protocols  Road accidents  Road vehicles  Spread spectrum communication  Telecommunication traffic  Traffic control  Vehicle detection},
        doi={10.1109/MOBIQ.2007.4451013}
    }
    
  • Tong Zhou
    Romit Roy Choudhury
    Peng Ning
    Krishnendu Chakrabarty
    Year: 2008
    Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks
    MOBIQUITOUS
    IEEE
    DOI: 10.1109/MOBIQ.2007.4451013
Tong Zhou1, Romit Roy Choudhury1, Peng Ning2, Krishnendu Chakrabarty1
  • 1: Duke University
  • 2: North Carolina State University

Abstract

Vehicular ad hoc networks (VANETs) are being advocated for traffic control, accident avoidance, and a variety of other applications. Security is an important concern in VANETs because a malicious user may deliberately mislead other vehicles and vehicular agencies. One type of malicious behavior is called a Sybil attack, wherein a malicious vehicle pretends to be multiple other vehicles. Reported data from a Sybil attacker will appear to arrive from a large number of distinct vehicles, and hence will be credible. This paper proposes a light-weight and scalable framework to detect Sybil attacks. Importantly, the proposed scheme does not require any vehicle in the network to disclose its identity, hence privacy is preserved at all times. Simulation results demonstrate the efficacy of our protocol.

Keywords
Ad hoc networks Data security Privacy Protocols Road accidents Road vehicles Spread spectrum communication Telecommunication traffic Traffic control Vehicle detection
Published
2008-02-12
Publisher
IEEE
Modified
2011-08-08
http://dx.doi.org/10.1109/MOBIQ.2007.4451013
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL