High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Detection of Sybil Attacks & Nodes in Vehicular Ad Hoc Networks Based on Road Side Units

Author(s):

S. Devaki , Trinity College for Women, Namakkal.; K. Valarmathi, Trinity College for Women, Namakkal.; A. Vijayasarathi, Trinity College for Women, Namakkal.

Keywords:

Vehicular, Communication, Transportation, Vehicle

Abstract

Through the fast growth of wireless technologies, Privacy of personal place information of a vehicle ad-hoc network (VANET) users is attractive a more and more important issue. Services provided by Location based services to VANETs users can breach by Sybil attacks. by malicious vehicles claim multiple identities at the same time. The avoidance of these attacks, which could arise in otherwise out of the Road Side Units (RSUs) reporting have a challenge to detect, as it should gather a cooperation between the ability to identify the real identity of the malicious vehicle, and avoidance of vehicle users starting being tracked by malicious entity. These papers propose a solution to stop and detect Sybil attacks in VANETs. The classification of attackers is based on two types of authentication techniques. The first uses discovery tags embedded in the vehicle to confirm them to the RSU and obtain short lifetime certificates. The second uses certificates to confirm vehicles to their neighbors. The vehicular network is divided into diverse zones brought under the control of dissimilar guarantee authorities (CAs), forcing a vehicle to change its diploma at what time touching from a zone to another. One important characteristic of the projected solution is that it prevents attackers from tracking the mobility of the vehicles. Avoid false negatives is also addressed using observers in vehicle nodes. A set of duplication scenarios also are performance to evaluate the presentation of the proposed solution. In last, these articles summarize the assessment between our proposed approach prevent the network from various hurtful property. Later we propose improvement in RSU support certificate base detection mechanism.

Other Details

Paper ID: IJSRDV4I80009
Published in: Volume : 4, Issue : 8
Publication Date: 01/11/2016
Page(s): 153-156

Article Preview

Download Article