2017
DOI: 10.17148/iarjset.2017.4631
|View full text |Cite
|
Sign up to set email alerts
|

Segregation of Sybil Attack using Neighbouring Information in VANET

Abstract: Sybil attack bogus traffic scenario by sending fake message with multiple ID which often cause jam and accident in VANET. It is very hard to defend and establish when it is eject by devise attackers using their real ID. In this paper, we present Neighbor based information (NBH) in which trust value is to be calculated by their neighbor node which restrain to spread false message. NBH can detect Sybil attack with stolen ID. Simulation results show that proposed technique increases the detection and reduces the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Compared with the overhead of direct identity detection mechanisms, indirect identity detection mechanisms are more lightweight, such as the detection methods based on vehicle cooperation [18,21,[34][35][36]. Panchal [37] proposed a method of separating Sybil attacks using adjacent information in VANETs. In this scheme, RSU discovers its neighbor vehicles through the vehicle ID and then evaluates the trust degree of neighbor vehicles to detect Sybil attacks.…”
Section: Indirect Identity Detection Mechanismsmentioning
confidence: 99%
“…Compared with the overhead of direct identity detection mechanisms, indirect identity detection mechanisms are more lightweight, such as the detection methods based on vehicle cooperation [18,21,[34][35][36]. Panchal [37] proposed a method of separating Sybil attacks using adjacent information in VANETs. In this scheme, RSU discovers its neighbor vehicles through the vehicle ID and then evaluates the trust degree of neighbor vehicles to detect Sybil attacks.…”
Section: Indirect Identity Detection Mechanismsmentioning
confidence: 99%
“…Only after verification, the vehicles are able to send or receive messages [5]. Panchal et al [9] propose the RSU based identification. Kamal et al [10] proposed a session key-based certification method to detect the Sybil attack.…”
Section: Related Workmentioning
confidence: 99%