Research Article
Hybrid Trust-based Defense Mechanisms Against Sybil Attack in Vehicular Ad-hoc Networks
@INPROCEEDINGS{10.4108/eai.12-10-2019.2296524, author={Agria Rhamdhan and Fadhil Hidayat}, title={Hybrid Trust-based Defense Mechanisms Against Sybil Attack in Vehicular Ad-hoc Networks}, proceedings={Proceedings of the 7th Mathematics, Science, and Computer Science Education International Seminar, MSCEIS 2019, 12 October 2019, Bandung, West Java, Indonesia}, publisher={EAI}, proceedings_a={MSCEIS}, year={2020}, month={7}, keywords={sybil attack vanet network security ids}, doi={10.4108/eai.12-10-2019.2296524} }
- Agria Rhamdhan
Fadhil Hidayat
Year: 2020
Hybrid Trust-based Defense Mechanisms Against Sybil Attack in Vehicular Ad-hoc Networks
MSCEIS
EAI
DOI: 10.4108/eai.12-10-2019.2296524
Abstract
The application of IoT in Vehicular Ad-Hoc Networks (VANET) allows the realization of intelligent transportation systems to ensure the comfort and safety of road users. However, attacks that can interfere with this aim certainly need to be a significant concern because the stakes are not only network security but also the safety of the driver and its passengers. One of the attacks was the Sybil attack. It illegally changes into several different identities to carry out malicious activities such as disrupting routing and causing traffic jams. Various security methods are introduced to VANET to detect Sybil attacks, but there are still several issues. We proposed the design of a defense mechanism against Sybil attacks. It aims to be suitable for application on IoT networks that have limited resources considering accuracy, privacy, safety, and real-world implementations. The proposed design uses a hybrid scheme with a trust-based method. Each node has an obfuscated identity to guarantee privacy. The trust center in the form of a Road Side Unit (RSU) gives a reputation value to each identity evaluated periodically. Nodes form a fully distributed network when there is no RSU. It will use a data-centric neighbor trust scheme where its neighbors will assess each node based on the exchanging data. Each node reports on suspicious nodes to the RSU for evaluation. This mechanism allows RSU to evaluate suspicious node, which decides to isolate that Sybil node out of network.