
Defense mechanisms against Sybil attack in vehicular ad hoc network
Author(s) -
Ali Mohammadi Mahdiyeh,
Pouyan Ali A.
Publication year - 2015
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0122
pISSN - 1939-0114
DOI - 10.1002/sec.1049
Subject(s) - sybil attack , computer science , computer security , wireless ad hoc network , vehicular ad hoc network , mobile ad hoc network , class (philosophy) , payment , computer network , internet privacy , wireless , wireless sensor network , telecommunications , world wide web , artificial intelligence , network packet
Many researchers have focused on vehicular ad hoc networks in recent years. Because of the nature of wireless networks, security of these networks may be compromised against attackers. This leads to losses such as loss of people's lives and loss of productivity in trades and payment services. One of the harmful attacks against sensor and ad hoc networks is Sybil attack, which attacker tries to forge some identities. These identities can be real ones belonging to other vehicles in the network or bogus identities made by the attackers. The purposes of creating dummy entities are for network disruption, traffic safety violation and, briefly, for the attacker's goals. In this paper, we describe a general classification of various methods for Sybil attack detection in vehicular ad hoc network. We then analyze advantages and disadvantages of the selected researches in each class to evaluate their performance with regard to safety and privacy issues. Copyright © 2014 John Wiley & Sons, Ltd.