Security issues and ANALYSING sybil attack detection in VANET

ISSN: 22773878
2Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

Abstract

As of late, the quantity of vehicles on the road has expanded tremendously. Because of high thickness and portability of nodes, conceivable dangers and road accidents are expanding. Wireless communication permits sending safety and other basic data. Vehicular Ad-Hoc Network (VANET) is an innovation which accommodates the vehicle as node to interconnect with each other through a wireless network. The essential structure goal of these applications is to serve the clients and give security of human lives amid their journey. Security is a major issue in VANET as it can be life threatening. We propose ECEDS (Elliptic Curve Encryption and Digital Signature) gives system security by utilizing a digital signature for message communicated over the system. This framework likewise used to counteract Sybil attack by limiting timestamps given by RsU at a beginning stage itself. An attacker is one of sort of end client, yet their role in the system is negative and makes issues for different segments of system. A serious attack, known as Sybil attack, against ad-hoc networks includes an attacker misguidedly asserting numerous characters. A Sybil attack delivers different messages to different nodes. Every message contains distinctive source personality. In this paper, we discusses some of the techniques put forwarded by researchers to detect Sybil attack in VANET. In this paper, we propose a Preference Batch Authentication Algorithm (PRBAA) expecting to decrease the message loss rate of nodes and Road-side Units (RsU’s). PRBAA is utilized to characterize the requests acquired from various nodes so as to furnish prompt reaction to crisis nodes with less time delay.

Cite

CITATION STYLE

APA

Selvakumar, K., & Naveen Kumar, S. (2019). Security issues and ANALYSING sybil attack detection in VANET. International Journal of Recent Technology and Engineering, 7(5), 386–391.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free