Movement Abnormality Evaluation Model in the Partially Centralized VANETs for Prevention Against Sybil Attack

Full Text (PDF, 413KB), PP.20-27

Views: 0 Downloads: 0


Mandeep Kaur 1,* Manish Mahajan 1

1. Computer Science Department, CGC Landran, Mohali, India

* Corresponding author.


Received: 25 Jul. 2015 / Revised: 13 Aug. 2015 / Accepted: 23 Sep. 2015 / Published: 8 Nov. 2015

Index Terms

Random way point mobility, Reference point group mobility, VANET, Sybil, Prankster


The VANETs carry many security concerns. One of the popular and dangerous attacks can be launched in the form of Sybil or Prankster attack, where an attacker inserts a fake position within in the cluster. The inserted fake node information can be utilized by the hackers in the case of selfish driver, traffic jams, selective collisions and other similar hazardous situations. To avoid such things the VANETs must be protected against such attacks. In this paper, a novel solution has been proposed to overcome the Sybil and prankster attacks on the VANETs. The new solution is capable of detecting the fake information injections by verifying the VANET node behaviour in the cluster. The behaviour of the node includes the direction, speed, pattern, etc. In case a node is found malicious, the whole cluster is reported against that node, and node is ordered to stop by the central control system. The proposed model has been developed using the random waypoint model. The random way point model is much closer to the real time VANETs. The random waypoint model has been compared against the reference point group model. The experimental results have shown the effectiveness of the proposed model.

Cite This Paper

Mandeep Kaur, Manish Mahajan, "Movement Abnormality Evaluation Model in the Partially Centralized VANETs for Prevention Against Sybil Attack", International Journal of Modern Education and Computer Science (IJMECS), vol.7, no.11, pp.20-27, 2015. DOI:10.5815/ijmecs.2015.11.03


[1]S. RoselinMary, M. Maheshwari, “Early Detection of DOS Attacks in VANET Using Attacked Packet Detection Algorithm (APDA)”, vol. 1, issue 1, IEEE, 2013.
[2]Daeinabi, A., Rahbar, A.G.: Detection of malicious vehicles (DMV) through monitoring in vehicular ad-hoc networks. Multimedia Tools Appl. 66(2), 325–338 (2013).
[3]Khan, Uzma, Shikha Agrawal, and Sanjay Silakari. "A Detailed Survey on Misbehavior Node Detection Techniques in Vehicular Ad Hoc Networks."Information Systems Design and Intelligent Applications. Springer India, 2015. 11-19.
[4]Constantinos Kolias, Georgios Kambourakis, Stefanos Gritzalis, “Attacks and Countermeasures on 802.16: Analysis and Assessment”, CST, vol. 1, pp. 487-514, IEEE, 2013.
[5]Vulimiri, A., Gupta, A., Roy, P., Muthaiah, S.N., Kherani, A.A.: Application of secondaryinformation for misbehavior detection in VANETs. IFIP. LNCS, vol. 6091, pp. 385–396.Springer, Berlin (2010).
[6]Sonali Swetapadma Sahu, Manjusha Pandey, “Distributed Denial of Service Attacks: A Review”, vol. 1, pp. 65-71, IJMECS, 2013.
[7]Kim, C.H., Bae, and I.H.: A misbehavior based reputation management system for VANETS.LNEE 181, 441–450 (2012).
[8]Ghosh,M.,Varghese,A.,Kherani,A.A.,Gupta,A.: Distributed misbehavior detection inVANETs.In:Wireless Communications and Networking Conference,WCNC IEEE, pp. 1–6 (2009).
[9]Ghosh, M., Varghese, A., Gupta, A., Kherani, A.A., Muthaiah, S.N.: Detecting misbehaviors in VANET with integrated root-cause analysis. Ad Hoc Netw. 8, 778–790(2010).
[10]Ms. Poonam Barua, Mr. Sanjeev Indora, “Overview of Security Threats in WSN”, vol. 2, issue 7, pp. 422-426, IJCSMC, 2013.
[11]Marco Tiloca, Domenico De Guglielmo, Gianluca Dini and Giuseppe Anastasi, “SAD-SJ: a Self-Adaptive Decentralized solution against Selective Jamming attack in Wireless Sensor Networks”, ETFA, vol. 1, pp. 1-8, IEEE, 2013.
[12]Wahab, O.A., Otrok, H., Mourad, A.: A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles. Comput. Commun. 41, 43–54 (2014). Elsevier.
[13]Md. Monzur Morshed, Md. Rafiqul Islam, “CBSRP: Cluster Based Secure Routing Protocol”, IACC, vol. 1, pp. 571-576, IEEE, 2013.
[14]Bibhu, V., Roshan, K., Singh, K. B., & Singh, D. K. (2012). Performance Analysis of black hole attack in VANET. International Journal of Computer Network and Information Security (IJCNIS), 4(11), 47.
[15]Joe, M. M., Shaji, R. S., & Kumar, K. A. (2013). Establishing Inter Vehicle Wireless Communication in Vanet and Preventing It from Hackers. International Journal of Computer Network and Information Security (IJCNIS), 5(8), 55.