CFP last date
20 May 2024
Reseach Article

Detect the Sybil Attack by using GPSR Protocol

by Sheenam Arora, Chakshu Goel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 144 - Number 10
Year of Publication: 2016
Authors: Sheenam Arora, Chakshu Goel

Sheenam Arora, Chakshu Goel . Detect the Sybil Attack by using GPSR Protocol. International Journal of Computer Applications. 144, 10 ( Jun 2016), 42-47. DOI=10.5120/ijca2016910461

@article{ 10.5120/ijca2016910461,
author = { Sheenam Arora, Chakshu Goel },
title = { Detect the Sybil Attack by using GPSR Protocol },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2016 },
volume = { 144 },
number = { 10 },
month = { Jun },
year = { 2016 },
issn = { 0975-8887 },
pages = { 42-47 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2016910461 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T23:47:19.657258+05:30
%A Sheenam Arora
%A Chakshu Goel
%T Detect the Sybil Attack by using GPSR Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 144
%N 10
%P 42-47
%D 2016
%I Foundation of Computer Science (FCS), NY, USA

VANET is a vehicular ad hoc network. This is a part of mobile ad hoc network. VANETs also called as intelligent transportation system (ITS) in which vehicles convey to give auspicious data. Their point is to give security, information and management of network. Rather than of their numerous advantages vehicular network is inclined to various attacks. Like prankster attack, denial of service attack, black hole attack, alteration attack, fabrication attack, man in the middle attack, timing attack, illusion attack and so forth. In this research we will attempt to uproot Sybil attack in which node creates its multiple identities and it can be affected by various ways. In previous research researcher judge the estimated physical measurement on the bases of three parameter but it may also be the case that message delay occur due to various another reasons like queue problem, congestion problem, accidental problem, so this approach is not accurate due to absence of GPS. According to this work GPSR protocol will be used through which physical measurement of vehicle can be verified at any time and GPS coordinates will be compared. If GPS coordinate matched then there is no attack.

  1. Kumar, P.Vinoth, Maheshwari, M. “Prevention of Sybil attack and priority batch verification in VANETs” International Conference on Information Communication and Embedded Systems (ICICES), 2014, pp. 1 – 5.
  2. Dongxu Jin,JooSeok Song “A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks” 13th International Conference on Computer and Information Science (ICIS), 2014, pp. 281 – 286.
  3. de Sales, T.M., Almeida, H.O., Perkusich, A., de Sales, L. “A privacy-preserving authentication and Sybil detection protocol for vehicular ad hoc networks” International Conference on Consumer Electronics (ICCE), 2014,pp. 426 – 427.
  4. Hussain, R.,Abbas, F.,  Junngab Son,  Hasoo Eun “Privacy-aware route tracing and revocation games in VANET-based clouds” 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2013, pp. 730 – 735.
  5. Hussain, R., Junggab Son, Hasoo Eun, Sangjin Kim “Rethinking Vehicular Communications: Merging VANET with cloud computing” 4th International Conference on Cloud Computing Technology and Science (CloudCom), 2012, pp. 606 – 609.
  6. Janech, J., Lieskovsky, A., Krsak, E. “Comparation of Strategies for Data Replication in VANET Environment” 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2012, pp. 575 – 580.
  7. Ku, I, You Lu, Gerla, M., Ongaro, F. “Towards software-defined VANET: Architecture and services” 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET), 2014, pp. 103 – 110.
  8. Azogu, I.K.,  Ferreira, M.T., Hong Liu “A security metric for VANET content delivery” Global Communications Conference (GLOBECOM), 2012, pp. 991 – 996.
  9. Wanting Zhu,  Qing Zhang, Fong, A.C.M. “Performance Analysis of a Hierarchical Structured VANET” IEEE International Conference on and IEEE Cyber, Physical and Social Computing Green Computing and Communications (GreenCom), 2013, pp. 1352 – 1356.
  10. Hao Jiang, Siyue Chen, Yang Yang, Zhizhong Jie “Estimation of Packet Loss Rate at Wireless Link of VANET—RPLE” 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), 2010, pp. 1 – 5.
  11. Yibo Yang, Hongling Li, Qiong Huang “Mobility management in VANET” 22nd Wireless and Optical Communication Conference (WOCC), 2013, pp. 298 – 303.
  12. Hsin-Te Wu, Wei-Shuo Li, Tung-Shih Su, Wen-Shyong Hsieh “A Novel RSU-Based Message Authentication Scheme for VANET” Fifth International Conference on Systems and Networks Communications (ICSNC), 2010, pp. 111 – 116.
  13. Ebers, S., Hellbuck, H., Pfisterer, D., Fischer, S. “Short paper: Collaboration between VANET applications based on open standards” Vehicular Networking Conference (VNC), 2013, pp. 174 – 177.
  14. Jie Luo, Xinxing Gu, Tong Zhao, Wei Yan “MI-VANET: A New Mobile Infrastructure Based VANET Architecture for Urban Environment” 72nd Vehicular Technology Conference Fall (VTC 2010-Fall), 2010, pp. 1 – 5.
  15. Nafi, N.S., Khan, J.Y. “A VANET based Intelligent Road Traffic Signaling System” Australasian Telecommunication Networks and Applications Conference (ATNAC), 2012, pp. 1 – 6.
  16. Noori, H., Olyaei, B.B. “A novel study on beaconing for VANET-based vehicle to vehicle communication: Probability of beacon delivery in realistic large-scale urban area using 802.11p” International Conference on Smart Communications in Network Technologies (SaCoNeT), 2013, pp. 1 – 6.
  17. Kun-chan Lan,  Chien-Ming Chou “Realistic mobility models for Vehicular Ad hoc Network (VANET) simulations” 8th International Conference on ITS Telecommunications, 2008, pp. 362 – 366.
  18. Garai, M., Boudriga, N. “A novel architecture for QoS provision on VANET” 10th International Conference on High Capacity Optical Networks and Enabling Technologies (HONET-CNS), 2013, pp. 25 – 31.
  19. El Mouna Zhioua, G, Jun Zhang,  Labiod, H., Tabbane, N. “VOPP: A VANET offloading potential prediction model” Wireless Communications and Networking Conference (WCNC), 2014, pp. 2408 – 2413.
  20. Rana, H., Thulasiraman, P., Thulasiram, R.K. “MAZACORNET: Mobility aware zone based ant colony optimization routing for VANET” IEEE Congress on Evolutionary Computation (CEC), 2013, pp. 2948 – 2955.
  21. Nikumbh, D.M., Kharadkar, R.D., Bhoi, A.D.,  Deshmukh, A.Y. “Analysis of distance based routing protocol in VANET” International Conference on Computing for Sustainable Global Development (INDIACom), 2014 , pp. 829 – 834.
  22. Sivaraj, R.,  Gopalakrishna, A.K.,  Chandra, M.G.,  Balamuralidhar, P. “QoS-enabled group communication in integrated VANET-LTE heterogeneous wireless networks” 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2011, pp. 17 – 24.
  23. Wagan, A.A., Mughal, B.M., Hasbullah, H. “VANET security framework for trusted grouping using TPM hardware: Group formation and message dissemination” International Symposium in Information Technology (ITSim), 2010, pp. 607 – 611.
  24. Wagan, Asif Ali, Jung, Low Tang “Security framework for low latency vanet applications” International Conference on Computer and Information Sciences (ICCOINS), 2014, pp. 1 – 6.
  25. Cardote, A., Sargento, S., Steenkiste, P “On the connection availability between relay nodes in a VANET” GLOBECOM Workshops (GC Wkshps), 2010, pp. 181 – 185.
  26. Kafil, P., Fathy, M., Lighvan, M.Z. “Modeling Sybil attacker behavior in VANETs” 9th International ISC Conference on Information Security and Cryptology, 2012, pp. 162 – 168.
  27. Gongjun Yan, Bista, B.B., Rawat, D.B., Shaner, E.F. “General Active Position Detectors Protect VANET Security” International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), 2011, pp. 11 – 17.
Index Terms

Computer Science
Information Sciences