Isolation of Sybil Attack in VANET using Neighboring Information

被引:0
|
作者
Saggi, Mandeep Kaur [1 ]
Kaur, Ranjeet [1 ]
机构
[1] DAV Univ, Dept Comp Sci, Jalandhar, Punjab, India
关键词
MANET; VANET; Malicious node; Sybil Attack; Collision; V2V communication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The advancement of wireless communication leads researchers to conceive and develop the idea of vehicular networks, also known as vehicular ad hoc networks (VANETs). In Sybil attack, the WSN is destabilized by a malicious node which create an innumerable fraudulent identities in favor of disrupting networks protocols. In this paper, a novel technique has been proposed to detect and isolate Sybil attack on vehicles resulting in proficiency of network. It will work in two-phases. In first phase RSU registers the nodes by identifying their credentials offered by them. If they are successfully verified, second phase starts & it allots identification to vehicles thus, RSU gathers information from neighboring nodes & define threshold speed limit to them & verify the threshold value is exceed the defined limit of speed. A multiple identity generated by Sybil attack is very harmful for the network & can be misused to flood the wrong information over network. Simulation results show that proposed detection technique increases the possibilities of detection and reduces the percentage of Sybil attack.
引用
收藏
页码:33 / 38
页数:6
相关论文
共 50 条
  • [31] Sybil Nodes as a Mitigation Strategy against Sybil Attack
    Trifa, Zied
    Khemakhem, Maher
    5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014), 2014, 32 : 1135 - 1140
  • [32] Sybil Attack-Resistant Blockchain-Based Proof-of-Location Mechanism with Privacy Protection in VANET
    Khatri, Narayan
    Lee, Sihyung
    Nam, Seung Yeob
    SENSORS, 2024, 24 (24)
  • [33] Intrusion Prevention System for DDoS Attack on VANET With reCAPTCHA Controller Using Information Based Metrics
    Poongodi, M.
    Vijayakumar, V.
    Al-Turjman, Fadi
    Hamdi, Mounir
    Ma, Maode
    IEEE ACCESS, 2019, 7 : 158481 - 158491
  • [34] Sybil attack vulnerability trilemma
    Platt, Moritz
    Platt, Daniel
    McBurney, Peter
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2024, 39 (04) : 446 - 460
  • [35] Decentralized Distance-based Strategy for Detection of Sybil Attackers and Sybil Nodes in VANET
    Krishnan, P. Remya
    Koushik, Ritesh
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (04)
  • [36] Quantifying resistance to the Sybil attack
    Margolin, N. Boris
    Levine, Brian Neil
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2008, 5143 : 1 - 15
  • [37] An Optimisation driven Deep Residual Network for Sybil attack detection with reputation and trust-based misbehaviour detection in VANET
    Velayudhan, Nitha C.
    Anitha, A.
    Madanan, Mukesh
    JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2024, 36 (05) : 721 - 744
  • [38] RETRACTED ARTICLE: Novel Sybil attack detection using RSSI and neighbour information to ensure secure communication in WSN
    Arthanareeswaran Angappan
    T. P. Saravanabava
    P. Sakthivel
    K. S. Vishvaksenan
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 6567 - 6578
  • [39] Detecting Sybil Attack based on State Information in Underwater Wireless Sensor Networks
    Li, Xun
    Han, Guangjie
    Qian, Aihua
    Shu, Lei
    Rodrigues, Joel
    2013 21ST INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM 2013), 2013, : 116 - 120
  • [40] An approach to mitigating Sybil attack in wireless networks using ZigBee
    Lee, Gunhee
    Lim, Jaesung
    Kim, Dong-Kyoo
    Yang, SungHyun
    Yoon, MyungHyun
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1005 - +