Comparative Study on Sybil Attack Detection Schemes

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2015, Vol 14, Issue 7

Abstract

Vehicular Ad Hoc Network (VANET) is a wireless network formed between a collection of vehicles connected through wireless connections. VANETs can help increase the passengers comfort, safety, efficiency and convenience by providing them with information about the ongoing road status and other relevant road information. VANETs, similar to other networks, face numerous security threats. One such threat is the Sybil attack, a critical threat that can impair the proper functioning of VANETs. In a Sybil attack, a malicious node illegitimately claims multiple identities and simultaneously exploits these fake identities in order todisturb the functionality of the VANET by disseminating false information. In the presence of a Sybil node, any kind of attack can be launched on the VANET. This paper provides a comprehensive review and comparison of the different techniques that have been proposed in the literature to prevent or reduce the adverse effects of Sybil attacks.

Authors and Affiliations

Salam Hamdan, Raad S. Al-Qassas, Sara Tedmori

Keywords

Related Articles

Design and Implementation of Hybrid Algorithm for e-news Classification.

Data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. As the use of internet is increasing day by day and with the advancement of interne...

A Study of Distance Metrics in Histogram Based Image Retrieval

There has been a profound expansion of digital data both in terms of quality and heterogeneity. Trivial searching techniques of images by using metadata, keywords or tags are not sufficient. Efficient Content-based Image...

REGION BASED CLUSTERING FOR DATA COLLECTION IN WSN

The lower cost and easier installation of the WSNs than the wired counterpart pushes industry and academia to pay more attention to this promising technology. Large scale networks of small energy-constrained sensor nodes...

EFFICIENT DESIGN OF STORAGE AND RETRIEVAL METHODS

The paper demonstrates the viability of a number of storage techniques such as hashing using multilingual texts. The empirical studies of hashing techniques based on multilingual provide researchers with insight informat...

Using Relational Database Model in Cloud Computing

The advent of digital systems for the production and transmission of information decisively influences human progress and represents the future in any field of social life. In order to survive, organizations must correla...

Download PDF file
  • EP ID EP650675
  • DOI 10.24297/ijct.v14i7.1898
  • Views 85
  • Downloads 0

How To Cite

Salam Hamdan, Raad S. Al-Qassas, Sara Tedmori (2015). Comparative Study on Sybil Attack Detection Schemes. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 14(7), 5869-5876. https://www.europub.co.uk/articles/-A-650675