Spider-Monkey Technique has been used by some researchers to detect Sybil attacks in Large Scale VANETS. According to the researchers, Celestine Iwendi ; Mueen Uddin ; James A. Ansere ; P. Nkurunziza ; J. H. Anajemba ; Ali Kashif Bashir
“Vehicles attacked by malicious nodes usually cause time synchronization error in beacon message dissemination. This causes propagation delay and beacon message loss. The author’s proposed technique mitigates this by employing two detection time synchronization techniques. The inter-vehicle detection phase that avoids collision among beacon messages inside vehicular cluster formed was first considered. In the intravehicular detection phase, the technique relies on beacon message broadcast with TDMA technique. TDMA preserves the allocated time splitting timetable for the existing cluster of vehicles, in two-way message transmission from elected CHs to vehicle members in the network. Packet Beacon messages received from the prior adjacent vehicle are checked before sending to the roadside unit (RSU) for position verification, message authentication and alerting analysis of the vehicle.
The paper compares their proposed technique with other multihop networks such as P2DAP, SKC and EAPDA in terms of energy consumption, accuracy estimation of beacon message time synchronization and the probability of detection of Sybil attacks for connected vehicles at distributed VANETs environment. The results confirm that the proposed technique outperforms the exiting protocols over long transmission distance for Sybil attack detections in dynamic VANETs settings in terms of detection rate, measurement precision and energy efficiency.
The contribution of their paper can be summarized as follows:
- Spider monkey time synchronization (SMTS) was proposed for large-scale VANETs based on cooperative scenarios of CSMA/CA and TDMA detection time synchronization techniques.
- A bio-inspired spider monkey technique was employed as packet-controlled which is like an ant colony optimization that uses pheromone tracking technique for malicious nodes detection.
- Power consumption was investigated in randomly distributed packet beacon message to avoid message collisions and redundancy to maximize the network lifetime.
- Finally, the probability of detection for connected vehicles was evaluated and was compared to other detection protocols.
The findings were published in IEEE Access Volume 6, 2018 and can be viewed at https://ieeexplore.ieee.org/document/8432424