2021
DOI: 10.1007/s11277-021-09102-x
|View full text |Cite
|
Sign up to set email alerts
|

Sybil Attack with RSU Detection and Location Privacy in Urban VANETs: An Efficient EPORP Technique

Abstract: Nowadays, Vehicular ad hoc networks (VANETs) has received interest in the research because it is used to provide the information for drivers and passengers. In the urban VANET, security and safety is a main issue in recent days because of different kinds of attacks. From the attacks, Sybil attack can be considered as a very difficult for urban VANET networks. Hence, in this paper Emperor Penguin Optimization based Routing protocol (EPORP) is developed for detecting the Sybil attack as well as increasing the sy… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 41 publications
0
6
0
Order By: Relevance
“…The ensuing procedure, which is dependent on the value of WILLING and the addition of a novel element, will determine the final reputation of a node. 13…”
Section: Phase 3: Nodes That Forward Rreq Assortmentmentioning
confidence: 99%
See 2 more Smart Citations
“…The ensuing procedure, which is dependent on the value of WILLING and the addition of a novel element, will determine the final reputation of a node. 13…”
Section: Phase 3: Nodes That Forward Rreq Assortmentmentioning
confidence: 99%
“…Optimization‐based routing protocol was designed by Velayudhan et al 13 to identify the Sybil attack, which improves the security of VANETs. In order to improve VANET security, the researcher focus on identifying the Sybil attack.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The primary goal of a Sybil attack in VANETs is to compromise the integrity and reliability of the network by creating numerous malicious nodes (Sybil nodes) that collaborate to disrupt communication, spread false information, or manipulate network protocols. As shown in Figure 9, Sybil attacker generates multiple fake identities, each with a unique pseudonym, to gain influence or control over the network [165], [166]. Sybil nodes collaborate to amplify the impact of malicious activities, such as injecting false traffic information, disrupting routing protocols, or causing confusion in safety applications.…”
Section: Sybil Attacksmentioning
confidence: 99%
“…Protocol)-Based Secure Protocol. Te EPORP-secured protocol, as suggested in reference [74], has been proposed to augment the system's security and detect the existence of Sybil attack nodes. In the context of vehicular ad-hoc networks (VANETs), detecting Sybil attacks is crucial to mitigate instances of system failure.…”
Section: Eporp (Emperor Penguin Optimization-based Routingmentioning
confidence: 99%