Abstract
Infrastructure-less Vehicular Ad hoc Networks (VANETs) in the absence of any centralized controlling authority are highly vulnerable to various types of malicious attacks. Amongst these attacks, Sybil attack is one such deadly attack that can disrupt the normal functioning of most of the VANET protocols without getting detected easily. In this attack, a legitimate vehicle with malicious intentions enters the network and can mischievously launch a few virtual vehicles camouflaging these virtual vehicles in such a way that these appear to be the legitimate vehicles for all other legitimate vehicles in the network. These superficial vehicles are known as Sybil vehicles and intend to affect the routing mechanism in a VANET by helping the malicious node to assume control of the network. In this paper, we have explored the possibility of Sybil attack disrupting the normal functioning of Position-Based category of Routing Protocols in a VANET. Our exploration here focuses only on one of the significant protocols in the category known as, the Greedy Perimeter Coordinator Routing (GPCR) protocol. With the help of the results of experimental setups, it has been shown that it is always possible for the Sybil attack to disrupt the functioning of GPCR protocol in a VANET. We are also in the process of exploring the impact of Sybil attack on other significant routing protocols for VANETs separately.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Singh, K.D., Rawat, P., Bonnin, J.M.: Cognitive radio for vehicular ad hoc networks (cr-vanets): approaches and challenges. EURASIP J. Wirel. Commun. Netw. 49, 1–22 (2014)
Liang, W., Li, Z., Zhang, H., Wang, S., Bie, R.: Vehicular ad hoc networks: architectures, research issues, challenges and trends. Int. J. Distrib. Sens. Netw. 11(8), 745303 (2015)
Eze, E.C., Zhang, S., Liu, E., Eze, J.C.: Advances in vehicular ad-hoc networks (vanets): challenges and road-map for future development. Int. J. Autom. Comput. 13(1), 1–18 (2016)
Papadimitratos, P., Fortelle, A.D.L., Evenssen, K., Brignolo, R., Cosenza, S.: Vehicular communication systems: enabling technologies, applications, and future outlook on intelligent transportation. IEEE Commun. Mag. 47(11), 84–95 (2009)
Singh, P.K., Nandi, S.K., Nandi, S.: A tutorial survey on vehicular communication state of the art, and future research directions. Veh. Commun. 18, 100164 (2019)
Han, M.L., Kwak, B., Kim, H.K.: Anomaly intrusion detection method for vehicular networks based on survival analysis. Veh. Commun. 14, 52–63 (2018)
Li, F., Wang, Y.: Routing in vehicular ad hoc networks: a survey. IEEE Veh. Technol. Mag. 2(2), 12–22 (2007)
Al-Kahtani, M. S.: Survey on security attacks in vehicular ad hoc networks (VANETS). In: 6th International Conference on Signal Processing and Communication Systems, Gold Coast, pp. 1–9. IEEE (2012)
Vasudeva, A., Sood, M.: Survey on sybil attack defense mechanisms in wireless ad hoc networks. J. Netw. Comput. Appl. 120, 78–118 (2018)
La, V.H., Cavalli, A.: Security attacks and solutions in vehicular ad hoc networks: a survey. Int. J. Ad hoc Netw. Syst. 4(2), 1–20 (2014)
Sood, M., Vasudeva, A.: Perspective of sybil attack in routing protocols of mobile ad hoc network. 4th International Conference of Networks and Communications (NETCOM). LNEE, vol. 131, pp. 3–13. Springer, New York (2013). https://doi.org/10.1007/978-1-4614-6154-8_1
Nishtha, Sood, M.: Sybil attack on position-based routing protocols for vehicle to vehicle communication in vehicular ad hoc networks. Int. J. Control Theory Appl. 10(40), 199–208 (2017)
Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, pp. 259–268. IEEE (2004)
Ali, L., Hassan, A., Li, F.: Authentication and privacy schemes for vehicular ad hoc networks (VANETs): a survey. Veh. Commun. 16, 45–61 (2019)
Khoza, E., Tu, C., Owolawi, P. A.: Comparative study of routing protocols for vehicular ad-hoc networks (VANETS). In: International Conference on Advances in Big Data, Computing and Data Communication Systems, icABCD, Durban. IEEE (2018)
Lochert, C., Mauve, M., Fubler, H., Hartenstein, H.: Geographic routing in city scenario. ACM SIGMOBILE Mobile Comput. Commun. Rev. 9(1), 69–72 (2005)
Karp, B., Kung, H. T.: Gpsr: greedy perimeter stateless routing for wireless networks. In: 6th Annual International Conference on Mobile Computing and Networking, Boston, pp. 243–254. ACM (2000)
Paul, B., Islam, M.J.: Survey over VANET routing protocols for vehicle to vehicle communication. IOSR J. Comput. Eng. 7(5), 01–09 (2012)
Lee, K. C., Haerri, J., Lee, U., Gerla, M.: Enhanced perimeter routing for geographic forwarding protocols in urban vehicular scenarios. In: IEEE Globecom Workshops, Washington, USA (2007)
Lee, K.C., Cheng, P., Gerla, M.: Geocross: A geographic routing protocol in the presence of loops in urban scenarios. Ad Hoc Netw. 8(5), 99–110 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Nishtha, Sood, M. (2020). Exploring the Possibility of Sybil Attack in Position Based Routing Protocols in VANETs: A Case Study of Greedy Perimeter Coordinator Routing (GPCR). In: Batra, U., Roy, N., Panda, B. (eds) Data Science and Analytics. REDSET 2019. Communications in Computer and Information Science, vol 1230. Springer, Singapore. https://doi.org/10.1007/978-981-15-5830-6_7
Download citation
DOI: https://doi.org/10.1007/978-981-15-5830-6_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5829-0
Online ISBN: 978-981-15-5830-6
eBook Packages: Computer ScienceComputer Science (R0)