Improving neighboring vehicle method to detect sybile attack in vehicular ad hoc network

Recent technology known as Vehicular Ad Hoc Network (VANET) is invited to serve new vehicle driving experience. It is very useful to mitigate collision and utilizes traffic. Even though, VANET seems to be a promising technology, its drawbacks are inadequate with the security for a public accessible...

Full description

Bibliographic Details
Main Author: Bojnord, Hoda Soltanian (Author)
Format: Thesis
Published: 2013.
Subjects:
Online Access:Get fulltext
LEADER 01916 am a22001573u 4500
001 48219
042 |a dc 
100 1 0 |a Bojnord, Hoda Soltanian  |e author 
245 0 0 |a Improving neighboring vehicle method to detect sybile attack in vehicular ad hoc network 
260 |c 2013. 
520 |a Recent technology known as Vehicular Ad Hoc Network (VANET) is invited to serve new vehicle driving experience. It is very useful to mitigate collision and utilizes traffic. Even though, VANET seems to be a promising technology, its drawbacks are inadequate with the security for a public accessible technology. VANET security is essential because a badly designed VANET is vulnerable to network attacks, and this may danger the safety of drivers, and As long as VANETs are the wireless network, there are different kinds of attacks and threats can happen in VANETs. Sybil attack is one of the most important attacks in VANETs. This thesis deals with the problem of the security in VANET especially in Sybil attack. In Sybil attack, a vehicle makes the identities of several vehicles; these IDs can be used for playing any kind of attack in the network. These false identities also create the illusion that there are additional vehicles on the road. In this research, a robust detection mechanism against Sybil attack in VANET is addressed based on fuzzy detection mechanism. Our contribution behind the implementation of proposed approach is that each vehicle has different set of neighbors providing sufficiently high density in VANET. In the simulation section, we study the proposed method in different ways and present the efficiency of the fuzzy method based on true and false detection rate and overall overhead. 
546 |a en 
650 0 4 |a QA76 Computer software 
655 7 |a Thesis 
787 0 |n http://eprints.utm.my/id/eprint/48219/ 
856 |z Get fulltext  |u http://eprints.utm.my/id/eprint/48219/1/HodaSoltanianBojnordMUTMAIS2013.pdf