Skip to main content

Exploring the Possibility of Sybil Attack in Position Based Routing Protocols in VANETs: A Case Study of Greedy Perimeter Coordinator Routing (GPCR)

  • Conference paper
  • First Online:
Data Science and Analytics (REDSET 2019)

Abstract

Infrastructure-less Vehicular Ad hoc Networks (VANETs) in the absence of any centralized controlling authority are highly vulnerable to various types of malicious attacks. Amongst these attacks, Sybil attack is one such deadly attack that can disrupt the normal functioning of most of the VANET protocols without getting detected easily. In this attack, a legitimate vehicle with malicious intentions enters the network and can mischievously launch a few virtual vehicles camouflaging these virtual vehicles in such a way that these appear to be the legitimate vehicles for all other legitimate vehicles in the network. These superficial vehicles are known as Sybil vehicles and intend to affect the routing mechanism in a VANET by helping the malicious node to assume control of the network. In this paper, we have explored the possibility of Sybil attack disrupting the normal functioning of Position-Based category of Routing Protocols in a VANET. Our exploration here focuses only on one of the significant protocols in the category known as, the Greedy Perimeter Coordinator Routing (GPCR) protocol. With the help of the results of experimental setups, it has been shown that it is always possible for the Sybil attack to disrupt the functioning of GPCR protocol in a VANET. We are also in the process of exploring the impact of Sybil attack on other significant routing protocols for VANETs separately.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Singh, K.D., Rawat, P., Bonnin, J.M.: Cognitive radio for vehicular ad hoc networks (cr-vanets): approaches and challenges. EURASIP J. Wirel. Commun. Netw. 49, 1–22 (2014)

    Google Scholar 

  2. Liang, W., Li, Z., Zhang, H., Wang, S., Bie, R.: Vehicular ad hoc networks: architectures, research issues, challenges and trends. Int. J. Distrib. Sens. Netw. 11(8), 745303 (2015)

    Article  Google Scholar 

  3. Eze, E.C., Zhang, S., Liu, E., Eze, J.C.: Advances in vehicular ad-hoc networks (vanets): challenges and road-map for future development. Int. J. Autom. Comput. 13(1), 1–18 (2016)

    Article  Google Scholar 

  4. Papadimitratos, P., Fortelle, A.D.L., Evenssen, K., Brignolo, R., Cosenza, S.: Vehicular communication systems: enabling technologies, applications, and future outlook on intelligent transportation. IEEE Commun. Mag. 47(11), 84–95 (2009)

    Article  Google Scholar 

  5. Singh, P.K., Nandi, S.K., Nandi, S.: A tutorial survey on vehicular communication state of the art, and future research directions. Veh. Commun. 18, 100164 (2019)

    Google Scholar 

  6. Han, M.L., Kwak, B., Kim, H.K.: Anomaly intrusion detection method for vehicular networks based on survival analysis. Veh. Commun. 14, 52–63 (2018)

    Google Scholar 

  7. Li, F., Wang, Y.: Routing in vehicular ad hoc networks: a survey. IEEE Veh. Technol. Mag. 2(2), 12–22 (2007)

    Article  Google Scholar 

  8. Al-Kahtani, M. S.: Survey on security attacks in vehicular ad hoc networks (VANETS). In: 6th International Conference on Signal Processing and Communication Systems, Gold Coast, pp. 1–9. IEEE (2012)

    Google Scholar 

  9. Vasudeva, A., Sood, M.: Survey on sybil attack defense mechanisms in wireless ad hoc networks. J. Netw. Comput. Appl. 120, 78–118 (2018)

    Article  Google Scholar 

  10. La, V.H., Cavalli, A.: Security attacks and solutions in vehicular ad hoc networks: a survey. Int. J. Ad hoc Netw. Syst. 4(2), 1–20 (2014)

    Google Scholar 

  11. Sood, M., Vasudeva, A.: Perspective of sybil attack in routing protocols of mobile ad hoc network. 4th International Conference of Networks and Communications (NETCOM). LNEE, vol. 131, pp. 3–13. Springer, New York (2013). https://doi.org/10.1007/978-1-4614-6154-8_1

    Chapter  Google Scholar 

  12. Nishtha, Sood, M.: Sybil attack on position-based routing protocols for vehicle to vehicle communication in vehicular ad hoc networks. Int. J. Control Theory Appl. 10(40), 199–208 (2017)

    Google Scholar 

  13. Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, pp. 259–268. IEEE (2004)

    Google Scholar 

  14. Ali, L., Hassan, A., Li, F.: Authentication and privacy schemes for vehicular ad hoc networks (VANETs): a survey. Veh. Commun. 16, 45–61 (2019)

    Google Scholar 

  15. Khoza, E., Tu, C., Owolawi, P. A.: Comparative study of routing protocols for vehicular ad-hoc networks (VANETS). In: International Conference on Advances in Big Data, Computing and Data Communication Systems, icABCD, Durban. IEEE (2018)

    Google Scholar 

  16. Lochert, C., Mauve, M., Fubler, H., Hartenstein, H.: Geographic routing in city scenario. ACM SIGMOBILE Mobile Comput. Commun. Rev. 9(1), 69–72 (2005)

    Article  Google Scholar 

  17. Karp, B., Kung, H. T.: Gpsr: greedy perimeter stateless routing for wireless networks. In: 6th Annual International Conference on Mobile Computing and Networking, Boston, pp. 243–254. ACM (2000)

    Google Scholar 

  18. Paul, B., Islam, M.J.: Survey over VANET routing protocols for vehicle to vehicle communication. IOSR J. Comput. Eng. 7(5), 01–09 (2012)

    Article  Google Scholar 

  19. Lee, K. C., Haerri, J., Lee, U., Gerla, M.: Enhanced perimeter routing for geographic forwarding protocols in urban vehicular scenarios. In: IEEE Globecom Workshops, Washington, USA (2007)

    Google Scholar 

  20. Lee, K.C., Cheng, P., Gerla, M.: Geocross: A geographic routing protocol in the presence of loops in urban scenarios. Ad Hoc Netw. 8(5), 99–110 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nishtha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nishtha, Sood, M. (2020). Exploring the Possibility of Sybil Attack in Position Based Routing Protocols in VANETs: A Case Study of Greedy Perimeter Coordinator Routing (GPCR). In: Batra, U., Roy, N., Panda, B. (eds) Data Science and Analytics. REDSET 2019. Communications in Computer and Information Science, vol 1230. Springer, Singapore. https://doi.org/10.1007/978-981-15-5830-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5830-6_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5829-0

  • Online ISBN: 978-981-15-5830-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics