Evaluation of proposed technique for detection of Sybil attack in VANET
Keywords:
VANET, Sybil, Monitor modeAbstract
The vehicular Adhoc networks are the self configuring and de-centralized type of network in which no central controller is present. The vehicle nodes have high mobility due to which path establishment from source to destination is the major issue in the network. Sybil attack is such a critical attack where the multiple messages are created by the attacker and are sent to other vehicles with different Ids each time. This makes the other nodes get confused such that the nodes assume the messages are arriving from other nodes. Due to this a jam occurs within the network. This forces the vehicle to choose another path and leave the road which is a benefit for the attacker.In the recent times, various techniques have been proposed for the detection of malicious nodes from the network. The proposed technique is based on monitor mode and signal strength based technique. The simulation is been performed in Ns2 and results shows that purposed technique shows good results in terms of various parameters.
References
Rajesh Rajamani et al “On spacing policies for highway vehicle automation”, American control conference chicago, Illinois June 2000
Gang Liu and Han Guo, “ Some aspects of road sweeping vehicle automation”, IEEE lasme international conference on advanced intelligent mechatronics,2001
Kung et.al “A survey of mobility models for ad hoc network research”, wireless communication & mobile computing (WCMC): special issue on mobile ad hoc networking: research, trends and applications, vol. 2, no. 5, pp. 483-502, 2002.
HAO Wu "An Empirical Study of Short RangZe Communications for Vehicles", IJSER September , 2011, Cologne, Germany, pp 83-84
Su-Jin Kwag, “Performance Evaluation of IEEE 802.11 Ad-hoc Network in Vehicle to Vehicle Communication", Mobility 06, 1-59593-519-3
Michel Hugo "Self-Organized Traffic Control", VANET’10, September 24, o, Illinois,
Reena Dadhich Department of MCA, Govt. College of Engineering, Ajmer, India,” Mobility Simulation of Reactive Routing Protocols for Vehicular Ad-hoc Networks”(2011)
Supinder Kaur, Anil Kumar, “Techniques to Isolate Sybil Attack in VANET-A Review”, 2016, International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)
Ashritha M, Sridhar CS, “RSU Based Efficient Vehicle Authentication Mechanism for V ANETs”, 2015, IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO)
Mahdiyeh Alimohammadi and Ali A. Pouyan, “Sybil Attack Detection Using a Low Cost Short Group Signature in VANET”, 2015, IEEE
Sebastian Bittl, Arturo A. Gonzalez, Matthias Myrtus, Hanno Beckmann, Stefan Sailer, Bernd Eissfeller, “Emerging Attacks on VANET Security based on GPS Time Spoofing”, 2015 IEEE Conference on Communications and Network Security (CNS)
Anu S Lal, Reena Nair, “Region Authority Based Collaborative Scheme to Detect Sybil Attacks in VANET”, 2015 International Conference on Control, Communication & Computing India (ICCC)
Khaled Rabieh, Mohamed M. E. A. Mahmoud, Terry N. Guo, and Mohamed Younis, “Cross-Layer Scheme for Detecting Large-scale Colluding Sybil Attack in VANETs”, 2015, IEEE ICC
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.