Detection and Localization of Sybil Attack in VANET: A Review
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 9
Abstract
In Vehicular Communication, the security system against the attacker is an essential one. The significant below against the security of VANET is a Sybil attack. It is an attack in which a original identity of the vehicle is corrupted or theft by an attacker and creates multiple dummy identities for stealing the vehicle. Finding such type of attacker and the original vehicle is a challenging task in VANET. This survey paper briefly presents various Sybil attack detection mechanism in VANET.
Authors and Affiliations
K. Malathi, Dr. R. Manavalan
Resource Management Using Dynamic Load Balancing in Distributed Systems
In a distributed network of computing hosts, the performance of the system can depend on dividing up work effectively across the participating nodes. Dynamic load balancing have the ability of performing better than sta...
Methods of Regular Expression
Regular expressions are used to represent certain set of string in algebraic manner. Regular expressions are widely used in the field of compiler design, text editor, search for an email- address, grep filter of unix, t...
Design and Analysis of Solar-Powered Refrigeration System Using Parabolic Collector
Energy consumption increases very rapidly as the world developing. The ever increasing energy consumption worldwide makes it urgent to find new ways to use the energy resources in a more efficient and rational way. Solar...
An analysis of Euclidean Distance preserving perturbation for Privacy Preserving Data Mining
Privacy preserving data mining is a novel research direction in data mining. In recent years, with the rapid development in Internet, data storage and data processing technologies, privacy preserving data mining has bee...
Approaches in DOS Attacks
Application DoS attack,has emerged as a larger threat to network services, compared to the classic DoS attack. To identify application DoS attack, we propose a novel group testing (GT)-based approach deployed on back-en...