Privacy friendly detection technique of sybil attack in vehicular ad hoc network (VANET)

Vehicular communications play a substantial role in providing safety in transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain strong...

Full description

Saved in:
Bibliographic Details
Main Author: Cheraghi, Seyed Mohammad
Format: Thesis
Language:English
Published: 2013
Subjects:
Online Access:http://eprints.utm.my/id/eprint/34666/5/SeyedMohamadCheraghiMFSKSM2013.pdf
http://eprints.utm.my/id/eprint/34666/
http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:69699?site_name=Restricted Repository
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Language: English
Description
Summary:Vehicular communications play a substantial role in providing safety in transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. Security is an important concern in VANETs because a malicious user may deliberately mislead other vehicles and vehicular agencies. Sybil attacks have been regarded as a serious security threat to ad hoc networks and sensor networks. They may also impair the potential applications of VANETs (Vehicular Ad hoc Networks) by creating an illusion of traffic congestion. Sybil attack is a malicious vehicle pretends to be multiple vehicles. Reported data from a Sybil attacker will appear to arrive from a large number of distinct vehicles, and hence will be credible. Privacy is another issue that must be preserved. In order to maintain security, privacy ca be compromised, hence this research study proposes a privacy friendly framework to detect Sybil attack. Finally, we use MATLAB as a simulator and compare the simulation results with other method.