Abstract
Vehicular Ad Hoc Networks (VANETs) play a critical role in the future development of Intelligent Transportation Systems (ITS). These networks facilitate communication between vehicles and roadside infrastructure, establishing a dynamic network capable of sharing and processing traffic data. By harnessing this data, a comprehensive understanding of traffic conditions can be achieved, ultimately improving road safety and efficiency. VANETs have the potential to warn drivers about potential hazards, suggest optimal routes, and coordinate traffic signals. However, the current system design poses a vulnerability where a vehicle can acquire multiple identities, allowing it to launch a Sybil attack by impersonating multiple vehicles. In this attack, Sybil (or fake) vehicles generate and report false data, leading to fabricated congestion reports and corrupting traffic management data. To address this issue, this research proposes a novel Sybil attack detection scheme that leverages Verifiable Delay Functions (VDFs) and location data. The proposed scheme utilizes VDFs iteratively computed by vehicles throughout their journeys, forming a VDF chain where the included data is immutable. A vehicle obtains a signature on its recent VDF state from nearby Roadside Units (RSUs) and other vehicles and incorporates these signatures into its VDF chain. The inclusion of signatures in the VDF chains is time-bound and can’t be altered later. Essentially, the VDF chain serves as an immutable storage mechanism for each vehicle. Interactions between vehicles involve the exchange of signatures on VDF states, and these interactions, when compiled in a VDF chain, constitute a vehicle’s trajectory. By analyzing these trajectories, we can effectively detect Sybil trajectories. Unlike existing methods that solely rely on vehicle-to-RSU interactions, resulting in high false positive rates, our approach introduces vehicle-to-vehicle interactions using VDF chains, thereby increasing the detection rate. Extensive experiments and simulations are conducted to evaluate the proposed scheme’s performance in detection. The results demonstrate that our approach can accurately detect Sybil attacks while achieving low rates of false negatives and false positives when compared to existing models.
Similar content being viewed by others
Data Availability
Not Applicable
References
Hasan M, Mohan S, Shimizu T, Lu H (2020) Securing Vehicle-to-Everything (V2X) Communication Platforms. IEEE Trans Intell Veh 5:693–713
Sakiz Fatih, Sen Sevil (2017) A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Networks 61:33–50
Subramanian V, Rajendra Y, Sahai S, Shukla SK (2020) Decentralized device authentication model using the trust score and blockchain technology for dynamic networks, In: 2020 IEEE International Conference on Blockchain (Blockchain), IEEE, pp. 116–125
Park S, Aslam B, Turgut D, Zou CC (2009) Defense against sybil attack in vehicular ad hoc network based on roadside unit support. In: MILCOM 2009-2009 IEEE Military Communications Conference. IEEE, pp. 1–7
Chen C, Wang X, Han W, Zang B (2009) A robust detection of the sybil attack in urban vanets. In: 2009 29th IEEE International Conference on Distributed Computing Systems Workshops. IEEE, pp. 270–276
Chang S, Qi Y, Zhu H, Zhao J, Shen X (2012) Footprint: Detecting Sybil attacks in urban vehicular networks. IEEE Trans Parallel Distrib Syst 23(6):1103–1114
Baza M, Nabil M, Mahmoud MMEA, Bewermeier N, Fidan K, Alasmary W, Abdallah M (2020) Detecting sybil attacks using proofs of work and location in vanets. IEEE Transactions on Dependable and Secure Computing
Boneh, Dan and Bonneau, Joseph and Bünz, Benedikt and Fisch, Ben (2018) Verifiable delay functions. In: Annual international cryptology conference. Springer, pp. 757–788
Wesolowski B (2019) Efficient verifiable delay functions. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp. 379–407
Pietrzak K (2018) Simple verifiable delay functions. In: 10th innovations in theoretical computer science conference (itcs 2019). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik
Contributors O (2017) Planet Dump Retrieved from https://planet.osm.org, https://www.openstreetmap.org
Krajzewicz D, Erdmann J, Behrisch M, Bieker L (2012) Recent development and applications of SUMO-Simulation of Urban MObility. Int J adv Syst Meas 5(3 &4)
Nakamoto S (2008) Bitcoin whitepaper, URL: https://bitcoin.org/bitcoin.pdf-(: 17.07. 2019)
Attias V, Vigneri L, Dimitrov V (2020) Implementation study of two verifiable delay functions. Cryptology ePrint Archive
Gu P, Khatoun R, Begriche Y, Serhrouchni A (2017) k-Nearest Neighbours classification based Sybil attack detection in Vehicular networks. In: 2017 Third International Conference on Mobile and Secure Services (MobiSecServ). IEEE, pp. 1–6
Lim K, Tuladhar KM, Kim H (2019) Detecting location spoofing using ADAS sensors in VANETs. In: 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE. pp. 1–4
Azam S, Bibi M, Riaz R, Rizvi SS, Kwon SJ (2022) Collaborative Learning Based Sybil Attack Detection in Vehicular AD-HOC Networks (VANETS). Sensors 22:1–17
Chen Y, Lai Y, Zhang Z, Li H, Wang Y (2023) MDFD: A multi-source data fusion detection framework for Sybil attack detection in VANETs. Computer Networks 224:109608
Velayudhan, Nitha C and Anitha, A and Madanan, Mukesh (2021) Sybil attack detection and secure data transmission in VANET using CMEHA-DNN and MD5-ECC. J Ambient Intell Humaniz Comput pp. 1–13
Velayudhan NC, Anitha A, Madanan M (2022) Sybil attack with RSU detection and location privacy in urban VANETs: An efficient EPORP technique. Wirel Pers Commun pp. 1–29
Zhang Z, Lai Y, Chen Y, Wei J, Wang Y (2023) Detection method to eliminate Sybil attacks in Vehicular Ad-hoc Networks. Ad Hoc Networks 141:103092
Xiao B, Yu B, Gao C (2006) Detection and localization of sybil nodes in vanets. In: Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks, pp 1–8
Guette G, Ducourthial B (2007) On the Sybil attack detection in VANET. In: 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems. IEEE, pp. 1–6
Yu B, Xu CZ, Xiao B (2013) Detecting sybil attacks in VANETs. J Parallel Distrib Comput 73(6):746–756
Yao Y, Xiao B, Wu G, Liu X, Yu Z, Zhang K, Zhou X (2018) Multi-channel based Sybil attack detection in vehicular ad hoc networks using RSSI. IEEE Trans Mob Comput 18(2):362–375
Hamdan S, Hudaib A, Awajan A (2021) Detecting Sybil attacks in vehicular ad hoc networks. Int J Parallel Emergent Distrib Syst 36(2):69–79
Yao Y, Xiao B, Wu G, Liu X, Yu Z, Zhang K, Zhou X (2018) Multi-channel based Sybil attack detection in vehicular ad hoc networks using RSSI. IEEE Trans Mob Comput 18(2):362–375
Zheng K, Trajcevski G, Zhou X, Scheuermann P (2011) Probabilistic range queries for uncertain trajectories on road networks. In: Proceedings of the 14th International Conference on Extending Database Technology, pp. 283–294
Wei LY, Zheng Y, Peng WC (2012) Constructing popular routes from uncertain trajectories. In: Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 195–203
Zhang X, Ray S, Shoeleh F, Lu R, Velegrakis Y, Zeinalipour-Yazti D, Chrysanthis PK, Guerra F (2021) Efficient Contact Similarity Query over Uncertain Trajectories. In: EDBT. pp. 403–408
Funding
This work is part of a project titled Development of Secure IoT Communication using the Blockchain Technology funded by the Department of Science and Technology (DST), Ministry of Science and Technology, Government of India under the Cyber Security Research of Interdisciplinary Cyber-Physical Systems (ICPS). We also thank the Ministry of Education, Government of India, for the support.
Author information
Authors and Affiliations
Contributions
Mr Yuvaraj Rajendra conceptualized the study, designed the methodology, conducted the experiments, and analyzed the results. He took the lead in writing the manuscript. Mr Venkatesan Subramanian and Mr Sandeep Shukla provided supervision for the research project, offering guidance on the study design and methodology. They critically reviewed the manuscript, provided valuable feedback, and made substantial revisions to improve the quality and coherence of the paper. All authors have read and approved the final version of the manuscript.
Corresponding author
Ethics declarations
Ethical Approval
This article does not contain any studies performed by any of the authors with human participants or animals.
Conflict of interest
All authors declare that they have no conflict of interest in the presented work. All authors have contributed to the paper.
Consent to Publish
All authors have given their consent to publish this research paper in the Peer-to-Peer Networking Applications journal.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rajendra, Y., Subramanian, V. & Shukla, S.K. Sybil attack detection in ultra-dense VANETs using verifiable delay functions. Peer-to-Peer Netw. Appl. (2024). https://doi.org/10.1007/s12083-024-01673-3
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12083-024-01673-3