IJCNIS Vol. 17, No. 4, 8 Aug. 2025
Cover page and Table of Contents: PDF (size: 764KB)
PDF (764KB), PP.71-83
Views: 0 Downloads: 0
VANET, Sybil Attack, RSSI, Channel Profile
Vehicular Ad hoc Networks (VANETs) are vital for efficient and secure vehicle-to-infrastructure communication in intelligent transportation systems. sybil attacks, where malicious entities adopt multiple identities, are a major security concern in VANETs. Detecting and mitigating these attacks is crucial for ensuring communication reliability and trust. This article focuses on detecting sybil attacks in Vehicle-to-Vehicle (V2V) communication by using a novel mechanism that characterizes the wireless channel through Received Signal Strength Indicator (RSSI) and angular spread in both azimuth and elevation planes. By incorporating angular spread alongside RSSI, the proposed mechanism offers more accurate and robust detection, particularly in dense vehicle environments. Utilizing a precise wireless channel model based on ray tracing statistics, the approach outperforms traditional RSSI-based methods. Experimental results confirm the enhanced accuracy and reliability of the proposed mechanism for detecting sybil attacks in V2V communication scenarios.
Reham Almesaeed "Real-time Sybil Attack Detection Based on Channel Characterization in VANET", International Journal of Computer Network and Information Security(IJCNIS), Vol.17, No.4, pp.71-83, 2025. DOI:10.5815/ijcnis.2025.04.05
[1]J. R. Douceur, “The Sybil Attack,” IPTPS, p. 251–260, 2002.
[2]M. raya, P. Papadimitratos and J. Habaux, “Securing Vehicular Communications,” IEEE Wireless Communications, vol. 13, no. 5, p. 8–15, 2006.
[3]Y. Zhang, B. DAS and F. Qiao, “Sybil Attack Detection and Prevention in VANETs: A Survey,” in Proceedings of the Future Technologies Conference (FTC), 2020.
[4]C. Wang, L. Zhu, L. Gong, Z. Zhao and L. Yang, “Channel State Information-Based Detection of Sybil attacks in Wireless Networks,” Journal of Internet Services and Information Security, vol. 8, no. 1, 2018.
[5]A. A. Mane, “Sybil attack in VANET,” International Journal of Computational Engineering Research, vol. 6, no. 12, p. 2250 – 3005, 2016.
[6]M. Bhise and S. D. Kamble, “Review on Detection and Mitigation of Sybil Attack in the Network,” Procedia Computer Science, vol. 78, pp. 395-401, 2016.
[7]G. D. Putra and S. Sulistyo, “Trust Based Approach in Adjacent Vehicles to Mitigate Sybil Attacks in VANET,” in 2017 International Conference on Software and e-Business, 2017.
[8]A. Haddaji, S. Ayed and L. C. Fourati, “Blockchain-based Multi-Levels Trust Mechanism Against Sybil Attacks for Vehicular Networks,” in 2020 IEEE 14th International Conference on Big Data Science and Engineering (BigDataSE), 2020.
[9]Rhamdhan and F. Hidayat, “Hybrid Trust-based Defense Mechanisms Against Sybil Attack in Vehicular Ad-hoc Networks,” in Mathematics, Science, and Computer Science Education for Addressing Challenges and Implementations of Revolution-Industry 4.0(MSCEIS), 2019.
[10]Mehbodniya, J. L. Webber, H. Mohafez and K. Yadav, “Machine Learning Technique to Detect Sybil Attack on IoT Based Sensor Network,” IETE Journal of Research, 2021.
[11]S. M. Faisal, B. K. Gupta and T. Zaidi, “A hybrid framework to prevent VANET from Sybil Attack,” in 5th International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT), 2022.
[12]S. Venugopal and E. A. M. Anita, “An efficient trust based method for Sybil node detection in mobile wireless sensor network,” in Proceedings of the 3rd International Conference on Applied Science and Technology (ICAST’18), 2018.
[13]M. S. Naveed and M. H. Islma , “Detection of Sybil Attacks in Vehicular Ad Hoc Networks,” Universal Journal of Communications and Network, vol. 3, no. 1, pp. 15-25, 2015.
[14]J. Li, Z. Song, Y. Li, C. Cao and Y. He, “Trajectory as an Identity: Privacy-Preserving and Sybil-Resistant Authentication for Internet of Vehicles,” Security and Communication Networks, 2021.
[15]M. Mounica, R. Vijayasaraswathi and R. Vasavi, “Detecting Sybil Attack In Wireless Sensor Networks Using Machine Learning Algorithms,” in 2nd International Conference on Machine Learning, Security and Cloud Computing (ICMLSC 2020), 2021.
[16]Y. Chen, Y. Lai, Z. Zhang, H. Li and Y. W. Yang, “MDFD: A multi-source data fusion detection framework for Sybil attack detection in VANETs,” Computer Networks, vol. 224, 2023.
[17]Hammi, M. Y. Idir and R. Khatoun, “A machine learning based approach for the detection of sybil attacks in C-ITS,” in 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS), 2022.
[18]S. Kakulla and S. Malladi, “Sybil Attack Detection in VANET Using Machine Learning Approach,” Ingénierie des Systèmes d’Information, vol. 27, no. 4, pp. 605-611, 2022.
[19]T. Alladi, . V. Kohli, . V. Chamola and F. R. Yu, “A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems,” Digital Communications and Networks, vol. 9, no. 5, pp. 1113-1122, 2023.
[20]X. Feng, C.-y. Li, D.-x. Chen and J. Tang, “A method for defensing against multi-source Sybil attacks in VANET,” Peer-to-Peer Networking and Applications, vol. 10, p. 305–314, 2017.
[21]Z. Tu, H. Zhou, K. Li, H. Song and Y. Yang, “A Blockchain-based Trust and Reputation Model with Dynamic Evaluation Mechanism for IoT,” Computer Networks, vol. 218, 2022.
[22]K. J. Dutt and S. B. J. oshi, “Defending Against Sybil Attacks by Enhanced Event Based Reputation System in VANET,” International Journal of Engineering and Advanced Technology (IJEAT), vol. 9, no. 2, pp. 2249-8958, 2019.
[23]S. Azam, M. Bibi, R. Riaz, S. S. Rizvi and S. J. Kwon, “Collaborative Learning Based Sybil Attack Detection in,” Sensors (Basel), vol. 22, no. 18, 2022.
[24]R. Krishnan and A. R. Kumar, “A collaborative strategy for detection and eviction of Sybil attacker and Sybil nodes in VANET,” International Journal of Communication Systems, vol. 34, no. 3, 2020.
[25]M. Kabbur and. V. A. Kumar, “MAR_Sybil: Cooperative RSU Based Detection and Prevention of Sybil Attacks in Routing Process of VANET,” Journal of Physics: Conference Series, vol. 1427, 2019.
[26]Y. Liu and Y. Wu, “An Enhanced RSSI-Based Detection Scheme for Sybil Attack in Wireless Sensor Networks,” in Future of Information and Communication, 2020.
[27]Y. Yao and B. Xiao, “Multi-channel based Sybil Attack Detection in Vehicular Ad Hoc Networks using RSSI,” IEEE Transactions on Mobile Computing, vol. 18, pp. 362-375, 2018.
[28]W. Li and D. Zhang, “RSSI Sequence and Vehicle Driving Matrix Based Sybil Nodes Detection in VANET,” in IEEE 11th International Conference on Communication Software and Networks (ICCSN), 2019.
[29]Y. Yao, B. Xiao, G. Yang, Y. Hu and L. Wang, “Power Control Identification: A Novel Sybil Attack Detection Scheme in VANETs Using RSSI,” IEEE Journal on Selected Areas in Communications, vol. 37, no. 11, pp. 2588 - 2602, 2019.
[30]M. Bharti, S. Rani and. P. Singh, “RTBSAD: RSSI and Trust-Based Sybil Attack Detection in MANET,” Indian Journal of Computer Science and Engineering (IJCSE), vol. 13, no. 3, 2022.
[31]Y. Yao and B. Xiao, “Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs,” in 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017.
[32]T. Ma, Y. Hu, A. Aseeri, M. Nejad and R. Zhang, “Sybil Detection in Connected Vehicle Systems via,” in 3 IEEE International Conference on Mobility, Operations, Services and Technologies (MOST), 2023.
[33]M. T. Garip, P. H. Kim, P. Reiher and M. Gerla, “Interloc: An interference-aware rssi-based localization and sybil attack detection mechanism for vehicular ad hoc networks,” in 14th IEEE Annual Consumer Communications & Networking Conference (CCNC)., 2017.
[34]Q. Li, K. Zhang, M. Cheffena and X. Shen, “Channel-Based Sybil Detection in Industrial Wireless Sensor Networks: A Multi-Kernel Approach,” in 2017 IEEE Global Communications Conference (GLOBECOM), 2017.
[35]V. Indhuja, M. Kowshika, K. Naveena and V. Purni , “Extensive Detection of Sybil Attack using Spider Monkey Time Synchronization Technique in VANETs,” in First International Conference on Innovations and Challenges in Computing, Analytics and Security (ICICCAS-2020), 2020.
[36]R. Almesaeed, A. S. Ameen, E. Mellios, A. Doufexi, and A. R. Nix, “A proposed 3D extension to the 3GPP/ITU channel model for 800 MHz and 2.6 GHz bands,” in the 8th European Conference on Antennas and Propagation (EuCAP 2014), 2014.
[37]R. Almesaeed, A. Doufexi,, N. Dahnoun and A. R. Nix, “TVWS extension of the 3GPP/ITU channel model,” in 2013 IEEE 24th annual international symposium on personal, indoor, and mobile radio communications (PIMRC), 2-13.
[38]R. Almesaeed, A. S. Ameen, E. Mellios and A. Doufexi, “3D channel models: Principles, characteristics, and system implications,” IEEE Communications Magazine, vol. 55, no. 4, pp. 152-159, 2017.
[39]R. Almesaeed, “Comparison of 2D and 3D Propagation in Wi-Fi Networks,” in 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), 2018.
[40]I.-R. P.1816-4, “The prediction of the time and the spatial profile for broadband land mobile services using UHF and SHF bands,” ITU, 2019.
[41]IEEE, “1609.4-2016 - IEEE Standard for Wireless Access in Vehicular Environments (WAVE) -- Multi-Channel Operation,” IEEE, 2016.
[42]S. Salvador and P. K. Chan, “Toward Accurate Dynamic Time Warping in Linear Time and Space,” in Intelligent Data Analysis, 2004.