Skip to main content
Log in

Sybil attack detection in ultra-dense VANETs using verifiable delay functions

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Vehicular Ad Hoc Networks (VANETs) play a critical role in the future development of Intelligent Transportation Systems (ITS). These networks facilitate communication between vehicles and roadside infrastructure, establishing a dynamic network capable of sharing and processing traffic data. By harnessing this data, a comprehensive understanding of traffic conditions can be achieved, ultimately improving road safety and efficiency. VANETs have the potential to warn drivers about potential hazards, suggest optimal routes, and coordinate traffic signals. However, the current system design poses a vulnerability where a vehicle can acquire multiple identities, allowing it to launch a Sybil attack by impersonating multiple vehicles. In this attack, Sybil (or fake) vehicles generate and report false data, leading to fabricated congestion reports and corrupting traffic management data. To address this issue, this research proposes a novel Sybil attack detection scheme that leverages Verifiable Delay Functions (VDFs) and location data. The proposed scheme utilizes VDFs iteratively computed by vehicles throughout their journeys, forming a VDF chain where the included data is immutable. A vehicle obtains a signature on its recent VDF state from nearby Roadside Units (RSUs) and other vehicles and incorporates these signatures into its VDF chain. The inclusion of signatures in the VDF chains is time-bound and can’t be altered later. Essentially, the VDF chain serves as an immutable storage mechanism for each vehicle. Interactions between vehicles involve the exchange of signatures on VDF states, and these interactions, when compiled in a VDF chain, constitute a vehicle’s trajectory. By analyzing these trajectories, we can effectively detect Sybil trajectories. Unlike existing methods that solely rely on vehicle-to-RSU interactions, resulting in high false positive rates, our approach introduces vehicle-to-vehicle interactions using VDF chains, thereby increasing the detection rate. Extensive experiments and simulations are conducted to evaluate the proposed scheme’s performance in detection. The results demonstrate that our approach can accurately detect Sybil attacks while achieving low rates of false negatives and false positives when compared to existing models.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Algorithm 1
Algorithm 2
Algorithm 3
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data Availability

Not Applicable

References

  1. Hasan M, Mohan S, Shimizu T, Lu H (2020) Securing Vehicle-to-Everything (V2X) Communication Platforms. IEEE Trans Intell Veh 5:693–713

    Article  Google Scholar 

  2. Sakiz Fatih, Sen Sevil (2017) A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Networks 61:33–50

    Article  Google Scholar 

  3. Subramanian V, Rajendra Y, Sahai S, Shukla SK (2020) Decentralized device authentication model using the trust score and blockchain technology for dynamic networks, In: 2020 IEEE International Conference on Blockchain (Blockchain), IEEE, pp. 116–125

  4. Park S, Aslam B, Turgut D, Zou CC (2009) Defense against sybil attack in vehicular ad hoc network based on roadside unit support. In: MILCOM 2009-2009 IEEE Military Communications Conference. IEEE, pp. 1–7

  5. Chen C, Wang X, Han W, Zang B (2009) A robust detection of the sybil attack in urban vanets. In: 2009 29th IEEE International Conference on Distributed Computing Systems Workshops. IEEE, pp. 270–276

  6. Chang S, Qi Y, Zhu H, Zhao J, Shen X (2012) Footprint: Detecting Sybil attacks in urban vehicular networks. IEEE Trans Parallel Distrib Syst 23(6):1103–1114

    Article  ADS  Google Scholar 

  7. Baza M, Nabil M, Mahmoud MMEA, Bewermeier N, Fidan K, Alasmary W, Abdallah M (2020) Detecting sybil attacks using proofs of work and location in vanets. IEEE Transactions on Dependable and Secure Computing

  8. Boneh, Dan and Bonneau, Joseph and Bünz, Benedikt and Fisch, Ben (2018) Verifiable delay functions. In: Annual international cryptology conference. Springer, pp. 757–788

  9. Wesolowski B (2019) Efficient verifiable delay functions. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp. 379–407

  10. Pietrzak K (2018) Simple verifiable delay functions. In: 10th innovations in theoretical computer science conference (itcs 2019). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik

  11. Contributors O (2017) Planet Dump Retrieved from https://planet.osm.org, https://www.openstreetmap.org

  12. Krajzewicz D, Erdmann J, Behrisch M, Bieker L (2012) Recent development and applications of SUMO-Simulation of Urban MObility. Int J adv Syst Meas 5(3 &4)

  13. Nakamoto S (2008) Bitcoin whitepaper, URL: https://bitcoin.org/bitcoin.pdf-(: 17.07. 2019)

  14. Attias V, Vigneri L, Dimitrov V (2020) Implementation study of two verifiable delay functions. Cryptology ePrint Archive

  15. Gu P, Khatoun R, Begriche Y, Serhrouchni A (2017) k-Nearest Neighbours classification based Sybil attack detection in Vehicular networks. In: 2017 Third International Conference on Mobile and Secure Services (MobiSecServ). IEEE, pp. 1–6

  16. Lim K, Tuladhar KM, Kim H (2019) Detecting location spoofing using ADAS sensors in VANETs. In: 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE. pp. 1–4

  17. Azam S, Bibi M, Riaz R, Rizvi SS, Kwon SJ (2022) Collaborative Learning Based Sybil Attack Detection in Vehicular AD-HOC Networks (VANETS). Sensors 22:1–17

    Article  Google Scholar 

  18. Chen Y, Lai Y, Zhang Z, Li H, Wang Y (2023) MDFD: A multi-source data fusion detection framework for Sybil attack detection in VANETs. Computer Networks 224:109608

    Article  Google Scholar 

  19. Velayudhan, Nitha C and Anitha, A and Madanan, Mukesh (2021) Sybil attack detection and secure data transmission in VANET using CMEHA-DNN and MD5-ECC. J Ambient Intell Humaniz Comput pp. 1–13

  20. Velayudhan NC, Anitha A, Madanan M (2022) Sybil attack with RSU detection and location privacy in urban VANETs: An efficient EPORP technique. Wirel Pers Commun pp. 1–29

  21. Zhang Z, Lai Y, Chen Y, Wei J, Wang Y (2023) Detection method to eliminate Sybil attacks in Vehicular Ad-hoc Networks. Ad Hoc Networks 141:103092

    Article  Google Scholar 

  22. Xiao B, Yu B, Gao C (2006) Detection and localization of sybil nodes in vanets. In: Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks, pp 1–8

  23. Guette G, Ducourthial B (2007) On the Sybil attack detection in VANET. In: 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems. IEEE, pp. 1–6

  24. Yu B, Xu CZ, Xiao B (2013) Detecting sybil attacks in VANETs. J Parallel Distrib Comput 73(6):746–756

    Article  Google Scholar 

  25. Yao Y, Xiao B, Wu G, Liu X, Yu Z, Zhang K, Zhou X (2018) Multi-channel based Sybil attack detection in vehicular ad hoc networks using RSSI. IEEE Trans Mob Comput 18(2):362–375

    Article  Google Scholar 

  26. Hamdan S, Hudaib A, Awajan A (2021) Detecting Sybil attacks in vehicular ad hoc networks. Int J Parallel Emergent Distrib Syst 36(2):69–79

    Article  Google Scholar 

  27. Yao Y, Xiao B, Wu G, Liu X, Yu Z, Zhang K, Zhou X (2018) Multi-channel based Sybil attack detection in vehicular ad hoc networks using RSSI. IEEE Trans Mob Comput 18(2):362–375

  28. Zheng K, Trajcevski G, Zhou X, Scheuermann P (2011) Probabilistic range queries for uncertain trajectories on road networks. In: Proceedings of the 14th International Conference on Extending Database Technology, pp. 283–294

  29. Wei LY, Zheng Y, Peng WC (2012) Constructing popular routes from uncertain trajectories. In: Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 195–203

  30. Zhang X, Ray S, Shoeleh F, Lu R, Velegrakis Y, Zeinalipour-Yazti D, Chrysanthis PK, Guerra F (2021) Efficient Contact Similarity Query over Uncertain Trajectories. In: EDBT. pp. 403–408

Download references

Funding

This work is part of a project titled Development of Secure IoT Communication using the Blockchain Technology funded by the Department of Science and Technology (DST), Ministry of Science and Technology, Government of India under the Cyber Security Research of Interdisciplinary Cyber-Physical Systems (ICPS). We also thank the Ministry of Education, Government of India, for the support.

Author information

Authors and Affiliations

Authors

Contributions

Mr Yuvaraj Rajendra conceptualized the study, designed the methodology, conducted the experiments, and analyzed the results. He took the lead in writing the manuscript. Mr Venkatesan Subramanian and Mr Sandeep Shukla provided supervision for the research project, offering guidance on the study design and methodology. They critically reviewed the manuscript, provided valuable feedback, and made substantial revisions to improve the quality and coherence of the paper. All authors have read and approved the final version of the manuscript.

Corresponding author

Correspondence to Yuvaraj Rajendra.

Ethics declarations

Ethical Approval

This article does not contain any studies performed by any of the authors with human participants or animals.

Conflict of interest

All authors declare that they have no conflict of interest in the presented work. All authors have contributed to the paper.

Consent to Publish

All authors have given their consent to publish this research paper in the Peer-to-Peer Networking Applications journal.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajendra, Y., Subramanian, V. & Shukla, S.K. Sybil attack detection in ultra-dense VANETs using verifiable delay functions. Peer-to-Peer Netw. Appl. (2024). https://doi.org/10.1007/s12083-024-01673-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12083-024-01673-3

Keywords

Navigation