Sybil Attack in Vanet by Neighbourhood Information Passing
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 9
Abstract
In this paper, we will present one of the most applicable forms of Ad-Hoc networks; the Vehicular Ad-Hoc Networks (VANETs). VANET is the technology of building a robust Ad-Hoc network between mobile vehicles and each other, besides, between mobile vehicles and roadside units. It also demystifies some excerpts from the IEEE 802.11 standard that are related to the operation in the Ad-Hoc mode and illustrates the main points of its amendment in vehicular environments (IEEE 802.11p). Communications in wireless sensor networks are usually based on a unique identity that represents a network entity i.e. a node. Identities are used as an address to communicate with a network entity. In a Sybil attack a malicious node can generate and control a large number of logical identities on a single physical device. This gives the illusion to the network as if it were different legitimate nodes. A malicious device’s additional identities are known as Sybil nodes. This proposed work presents an algorithm to detect Sybil nodes having fabricated identities in a vehicular ad hoc network. Vehicular ad hoc network have many applications and if it is attacked by Sybil node then harmful situation can be created. To avoid this we have proposed a modified neighborhood algorithm for a city. The proposed algorithm checks the results for different sizes of blocks in the city and different number of Sybil nodes. For simulation purpose MATLAB has been used as a tool and inclusion of Sybil nodes number in the city is purely based on user’s desire. Results for different number of Sybil nodes will be checked for different block sizes of city.
Authors and Affiliations
Mr. Pankaj Kumar
CONTEMPORARY MATHEMATICAL TOOLS OF FORECASTING: OVERVIEW OF METROPOLIS HASTINGS ALGORITHMS
This paper used the Metropolis Hastings Markov Chain Monte Carlo algorithms to forecast and monitor the dynamics of HIV/AIDS prevalence rates in Ghana. The study sampled four sites in Upper East Region and explore...
STUDY OF THE VARIATIONS OF THE MACROSCOPIC ELECTRIC PARAMETERS OF A SOLAR CELL ACCORDING TO THE USE TEMPERATURE
The Research has for objective to increase the performances of the thin film solar cells. Many scientific publications were interested by the development of the thin films which make the cell. Others based their r...
A Survey on Software Fault tolerance in Parallel Computing
Software almost inevitably contains defects. Do everything possible to reduce the fault rate; Use faulttolerance techniques to deal with software faults. Fault tolerance is the ability of a system to perform its functio...
FPGA Implementation of (15, 7) BCH Encoder and Decoder for Audio Message
In a communication channel, noise and interferences introduce the bit errors during the transmission of the digital message. To get the error free communication, error control codes are used. This paper discusses...
DE-DUPLICATION WITH ENHANCED RELIABILITY AND SECURE AUDITING IN CLOUD
As the distributed computing innovation creates amid the most recent decade, outsourcing information to cloud administration for capacity turns into an alluring pattern, which benefits in saving endeavors on overw...