2014 5th International Conference - Confluence the Next Generation Information Technology Summit (Confluence) 2014
DOI: 10.1109/confluence.2014.6949365
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced lightweight sybil attack detection technique

Abstract: Mobile Ad hoc network comprises of many nodeswhich interact with each other through wireless links. It is infrastructure less in nature, due to which attackers can easily attack on the network from any side. There are many attacks which ruin the communication among the nodes of network. Among those attacks there is a Sybil attack that causes severe hazards to the network. Sybil attack is an attack which uses many identities at a time or one identity at a time. The identities used by Sybil attackers are either … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…In VANET there are some issues High Mobility, Real-time Guarantee, Privacy and Authentication, Location Awareness, Delay in VANET [10]. VANET is facing many attacks.…”
Section: Attacks In Vanetmentioning
confidence: 99%
See 1 more Smart Citation
“…In VANET there are some issues High Mobility, Real-time Guarantee, Privacy and Authentication, Location Awareness, Delay in VANET [10]. VANET is facing many attacks.…”
Section: Attacks In Vanetmentioning
confidence: 99%
“…In [10], it is developed to improve the lightweight Sybil attack detection technique. In lightweight technique there is one disadvantage, the Sybil nodes whose speed is less than 10m/s are also detected as legitimate nodes.…”
Section: B Privacy Preserved Based-approachesmentioning
confidence: 99%
“…Sybil Attack Detection Technique Sybil attack is an attack which uses many identities at a time or one identity at a time. The identities Used by Sybil attackers are either created by it or uses someone else's identity [13]. Sybil attackers distribute secret data is other networks and it reduces the secrecy of network.…”
Section: Literature Surveymentioning
confidence: 99%
“…In this paper [10] periodically exchanges its observations in order to determine the presence of an attack. Malicious nodes fabricating false observations will be detected and rendered ineffective.…”
Section: Previous Work Discussedmentioning
confidence: 99%