Downloads: 132 | Views: 267
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015 | Popularity: 6.6 / 10
Mitigation of Sybil Attack Using Location Aware Nodes in VANET
Dalbir Singh, Manjot Kaur
Abstract: VANETs also called as intelligent transportation system (ITS) in which vehicles communicate to provide timely information. Their aim is to provide security, information and management of network. Instead of their many advantages vehicular network is prone to various attacks. In this research removal of Sybil attack in which node creates its multiple identities and it can be affected by various ways. In previous work Sybil attack is prevented by using the timestamp. Every node has some time stamp to communicate with RSU in which identities are verified. If multiple identities exist then there must be an attacker. On high traffic roads there are number of vehicles for which RSU cannot process all vehicles and also vehicles have high mobility due to which timestamp may be collapse or may miss by vehicle. In previous work three methods were used to find the physical measurement of message that were Time of Arrival (TOA), Angel of Arrival (AOA), and Received Signal Strength (RSSI). In this work, we are using GPSR, Which Reduce the Chances of Attacks.
Keywords: VANET, ITS, RSU, TOA, RSSI
Edition: Volume 4 Issue 11, November 2015
Pages: 863 - 867
Similar Articles
Downloads: 175 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 457 - 461Artificial Intelligence for Hiring
Ishan Borker, Ashok Veda
Downloads: 159 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 338 - 384Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm
Dr. Niju P. Joseph, Dr. Priyanka Surendran
Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022
Pages: 885 - 888Image Based Steganography
Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 629 - 634A Face Spoof Detection using Feature Extraction and SVM
Lovely Pal, Renuka Singh