Full Paper View Go Back

Evaluation of proposed technique for detection of Sybil attack in VANET

Kanwalprit Singh1 , Harmanpreet Kaur2

  1. Dept. CSE, Sri Sai College Of Engg & Technology Manawal, IK Gujral Punjab Technical University, Jalandhar, India.
  2. Dept. CSE, Sri Sai College Of Engg & Technology Manawal, IK Gujral Punjab Technical University, Jalandhar, India.

Section:Research Paper, Product Type: Isroset-Journal
Vol.6 , Issue.5 , pp.10-15, Oct-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v6i5.1015


Online published on Oct 31, 2018


Copyright © Kanwalprit Singh, Harmanpreet Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kanwalprit Singh, Harmanpreet Kaur, “Evaluation of proposed technique for detection of Sybil attack in VANET,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.5, pp.10-15, 2018.

MLA Style Citation: Kanwalprit Singh, Harmanpreet Kaur "Evaluation of proposed technique for detection of Sybil attack in VANET." International Journal of Scientific Research in Computer Science and Engineering 6.5 (2018): 10-15.

APA Style Citation: Kanwalprit Singh, Harmanpreet Kaur, (2018). Evaluation of proposed technique for detection of Sybil attack in VANET. International Journal of Scientific Research in Computer Science and Engineering, 6(5), 10-15.

BibTex Style Citation:
@article{Singh_2018,
author = {Kanwalprit Singh, Harmanpreet Kaur},
title = {Evaluation of proposed technique for detection of Sybil attack in VANET},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {5},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {10-15},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=853},
doi = {https://doi.org/10.26438/ijcse/v6i5.1015}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.1015}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=853
TI - Evaluation of proposed technique for detection of Sybil attack in VANET
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Kanwalprit Singh, Harmanpreet Kaur
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 10-15
IS - 5
VL - 6
SN - 2347-2693
ER -

1086 Views    455 Downloads    177 Downloads
  
  

Abstract :
The vehicular Adhoc networks are the self configuring and de-centralized type of network in which no central controller is present. The vehicle nodes have high mobility due to which path establishment from source to destination is the major issue in the network. Sybil attack is such a critical attack where the multiple messages are created by the attacker and are sent to other vehicles with different Ids each time. This makes the other nodes get confused such that the nodes assume the messages are arriving from other nodes. Due to this a jam occurs within the network. This forces the vehicle to choose another path and leave the road which is a benefit for the attacker.In the recent times, various techniques have been proposed for the detection of malicious nodes from the network. The proposed technique is based on monitor mode and signal strength based technique. The simulation is been performed in Ns2 and results shows that purposed technique shows good results in terms of various parameters.

Key-Words / Index Term :
VANET, Sybil, Monitor mode

References :
[1] Rajesh Rajamani et al “On spacing policies for highway vehicle automation”, American control conference chicago, Illinois June 2000
[2] Gang Liu and Han Guo, “ Some aspects of road sweeping vehicle automation”, IEEE lasme international conference on advanced intelligent mechatronics,2001
[3] Kung et.al “A survey of mobility models for ad hoc network research”, wireless communication & mobile computing (WCMC): special issue on mobile ad hoc networking: research, trends and applications, vol. 2, no. 5, pp. 483-502, 2002.
[4] HAO Wu "An Empirical Study of Short RangZe Communications for Vehicles", IJSER September , 2011, Cologne, Germany, pp 83-84
[5] Su-Jin Kwag, “Performance Evaluation of IEEE 802.11 Ad-hoc Network in Vehicle to Vehicle Communication", Mobility 06, 1-59593-519-3
[6] Michel Hugo "Self-Organized Traffic Control", VANET’10, September 24, o, Illinois,
[7] Reena Dadhich Department of MCA, Govt. College of Engineering, Ajmer, India,” Mobility Simulation of Reactive Routing Protocols for Vehicular Ad-hoc Networks”(2011)
[8] Supinder Kaur, Anil Kumar, “Techniques to Isolate Sybil Attack in VANET-A Review”, 2016, International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)
[9] Ashritha M, Sridhar CS, “RSU Based Efficient Vehicle Authentication Mechanism for V ANETs”, 2015, IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO)
[10] Mahdiyeh Alimohammadi and Ali A. Pouyan, “Sybil Attack Detection Using a Low Cost Short Group Signature in VANET”, 2015, IEEE
[11] Sebastian Bittl, Arturo A. Gonzalez, Matthias Myrtus, Hanno Beckmann, Stefan Sailer, Bernd Eissfeller, “Emerging Attacks on VANET Security based on GPS Time Spoofing”, 2015 IEEE Conference on Communications and Network Security (CNS)
[12] Anu S Lal, Reena Nair, “Region Authority Based Collaborative Scheme to Detect Sybil Attacks in VANET”, 2015 International Conference on Control, Communication & Computing India (ICCC)
[13] Khaled Rabieh, Mohamed M. E. A. Mahmoud, Terry N. Guo, and Mohamed Younis, “Cross-Layer Scheme for Detecting Large-scale Colluding Sybil Attack in VANETs”, 2015, IEEE ICC

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation