We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Distributed Sybil Attack Detection in VANET

by Reza Mortazavi, Maryam Rahbari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 29 - Number 12
Year of Publication: 2011
Authors: Reza Mortazavi, Maryam Rahbari
10.5120/3704-5192

Reza Mortazavi, Maryam Rahbari . Distributed Sybil Attack Detection in VANET. International Journal of Computer Applications. 29, 12 ( September 2011), 25-27. DOI=10.5120/3704-5192

@article{ 10.5120/3704-5192,
author = { Reza Mortazavi, Maryam Rahbari },
title = { Distributed Sybil Attack Detection in VANET },
journal = { International Journal of Computer Applications },
issue_date = { September 2011 },
volume = { 29 },
number = { 12 },
month = { September },
year = { 2011 },
issn = { 0975-8887 },
pages = { 25-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume29/number12/3705-5192/ },
doi = { 10.5120/3704-5192 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:15:39.454074+05:30
%A Reza Mortazavi
%A Maryam Rahbari
%T Distributed Sybil Attack Detection in VANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 29
%N 12
%P 25-27
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security and Privacy are among the most important concerns in Vehicular Ad-hoc Networks (VANET). Widely accepted privacy preserving communication scheme in VANETcommunity -that is using pseudonyms –has left open doors for some security problems such as Sybil attack. In this paper, we have proposed an efficient approach detecting this attack while preserving privacy of vehicles in the network.

References
  1. Akyildiz, I.F., et al., A survey on sensor networks. Communications Magazine, IEEE, 2002. 40(8): p. 102-114.
  2. Lee, U., et al., Dissemination and harvesting of urban data using vehicular sensing platforms. Vehicular Technology, IEEE Transactions on, 2009. 58(2): p. 882-901.
  3. Gerla, M. and M. Gruteser, Vehicular Networks: Applications, Protocols, and Testbeds. Emerging Wireless Technologies and the Future Mobile Internet, 2011: p. 201.
  4. Guette, G. and B. Ducourthial. On the Sybil attack detection in VANET. 2007: IEEE.
  5. Bouassida, M.S., et al., Sybil nodes detection based on received signal strength variations within vanet. International Journal of Network Security, 2009. 9(1): p. 22–32.
  6. Grover, J., M.S. Gaur, and V. Laxmi. A novel defense mechanism against sybil attacks in VANET. 2010: ACM.
  7. Zhou, T., et al., P2DAP—Sybil Attacks Detection in Vehicular Ad Hoc Networks. Selected Areas in Communications, IEEE Journal on, 2011. 29(3): p. 582-594.
  8. Kounga, G., T. Walter, and S. Lachmund, Proving reliability of anonymous information in VANETs. Vehicular Technology, IEEE Transactions on, 2009. 58(6): p. 2977-2989.
  9. Papadimitratos, P., V. Gligor, and J.P. Hubaux. Securing vehicular communications-assumptions, requirements, and principles. 2006: Citeseer.
  10. Papadimitratos, P., et al. Architecture for secure and private vehicular communications: IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Sybil attack Privacy Preserving VANET Pseudonyms