CFP last date
20 December 2024
Reseach Article

Sybil Node Detection and Prevention Approach on Physical Location in VANET

by Priyanka Soni, Abhilash Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 128 - Number 16
Year of Publication: 2015
Authors: Priyanka Soni, Abhilash Sharma
10.5120/ijca2015906757

Priyanka Soni, Abhilash Sharma . Sybil Node Detection and Prevention Approach on Physical Location in VANET. International Journal of Computer Applications. 128, 16 ( October 2015), 38-42. DOI=10.5120/ijca2015906757

@article{ 10.5120/ijca2015906757,
author = { Priyanka Soni, Abhilash Sharma },
title = { Sybil Node Detection and Prevention Approach on Physical Location in VANET },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 128 },
number = { 16 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 38-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume128/number16/22961-2015906757/ },
doi = { 10.5120/ijca2015906757 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:21:55.415335+05:30
%A Priyanka Soni
%A Abhilash Sharma
%T Sybil Node Detection and Prevention Approach on Physical Location in VANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 128
%N 16
%P 38-42
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

VANET is a vehicular ad hoc network. This is a part of mobile ad hoc network. VANETs also called as intelligent transportation system (ITS) in which vehicles communicate to provide timely information. Their aim is to provide security, information and management of network. Instead of their many advantages vehicular network is prone to various attacks. Like prankster attack, denial of service attack, blackhole attack, alteration attack, fabrication attack, man in the middle attack, timing attack, illusion attack etc. In this we will use GPSR protocol to remove the Sybil attack. In GPSR protocol physical measurement of vehicle can be verified at any time and GPS coordinates will be compared. If GPS coordinate matched then there is no attack.

References
  1. Kumar, P.Vinoth, Maheshwari, M. “Prevention of Sybil attack and priority batch verification in VANETs”International Conference onInformation Communication and Embedded Systems (ICICES), 2014, pp. 1 – 5.
  2. Dongxu Jin,JooSeok Song “A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks”13th International Conference onComputer and Information Science (ICIS), 2014, pp. 281 – 286.
  3. de Sales, T.M., Almeida, H.O., Perkusich, A., de Sales, L. “A privacy-preserving authentication and Sybil detection protocol for vehicular ad hoc networks”International Conference onConsumer Electronics (ICCE), 2014,pp. 426 – 427.
  4. Hussain, R.,Abbas, F.,  Junngab Son,  HasooEun “Privacy-aware route tracing and revocation games in VANET-based clouds”9th International Conference onWireless and Mobile Computing, Networking and Communications (WiMob), 2013, pp. 730 – 735.
  5. Hussain, R,  Junggab Son,  HasooEun, Sangjin Kim “Rethinking Vehicular Communications: Merging VANET with cloud computing”4th International Conference onCloud Computing Technology and Science (CloudCom), 2012, pp. 606 – 609.
  6. Janech, Lieskovsky,Krsak, E. “Comparation of Strategies for Data Replication in VANET Environment”26th International Conference onAdvanced Information Networking and Applications Workshops (WAINA), 2012, pp. 575 – 580.
  7. Ku, I, You Lu, Gerla, M., Ongaro, F. “Towards software-defined VANET: Architecture and services”13th Annual MediterraneanAd Hoc Networking Workshop (MED-HOC-NET), 2014, pp. 103 – 110.
  8. Azogu, I.K., Ferreira, M.T., Hong Liu “A security metric for VANET content delivery” Global Communications Conference (GLOBECOM), 2012, pp. 991 – 996.
  9. Wanting Zhu, Qing Zhang, Fong, A.C.M. “Performance Analysis of a Hierarchical Structured VANET” IEEE International Conference on and IEEE Cyber, Physical and Social Computing Green Computing and Communications (GreenCom), 2013, pp. 1352 – 1356.
  10. Hao Jiang, Siyue Chen, Yang Yang, ZhizhongJie “Estimation of Packet Loss Rate at Wireless Link of VANET—RPLE”6th International Conference onWireless Communications Networking and Mobile Computing (WiCOM), 2010, pp. 1 – 5.
  11. Yibo Yang, Hongling Li, Qiong Huang “Mobility management in VANET”22ndWireless and Optical Communication Conference (WOCC), 2013, pp. 298 – 303.
  12. Hsin-Te Wu, Wei-Shuo Li, Tung-Shih Su, Wen-Shyong Hsieh “A Novel RSU-Based Message Authentication Scheme for VANET”Fifth International Conference onSystems and Networks Communications (ICSNC), 2010, pp. 111 – 116.
Index Terms

Computer Science
Information Sciences

Keywords

VANET sybil attack GPSR ITS