ProgramsView all programs
From the news
- Chancellor Amma Addresses the Parliament of World’s Religions
- Amrita Students Qualify for the European Mars Rover Challenge
Publication Type : Book Chapter
Thematic Areas : Amrita Center for Cybersecurity Systems and Networks
Publisher : Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations, CRC Press, p.35 -51.
Source : Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations, CRC Press, 2016, pp. 35 -51
Campus : Amritapuri
School : School of Engineering, Centre for Cybersecurity Systems and Networks, Department of Computer Science and Engineering
Center : Cyber Security, TBI
Department : Computer Science, cyber Security
Year : 2016
Abstract : Vehicular communication intends to improve the traffic safety for decreasing number of accidents and manages traffic for saving money and time. In vehicular communication, vehicles communicate wirelessly and so security of this network against attackers should be considered. To become a real technology that has public safety on the roads, vehicular ad hoc network (VANET) needs appropriate security architecture. Secure architecture should protect it from different types of security attacks and preserve privacy for drivers. One of these attacks against ad-hoc networks is Sybil attack that attacker is creating multiple identities that are identities belonging to other vehicles or dummy identities made by the attacker. Attacker is using them to gain a disproportionately large influence in the network leading to accidents or causing delay in some services for the driver using only one physical device. In this paper we present a case study of different selective methods for Sybil attack detection in vehicular networks and discuss about advantages and disadvantages of them for real implementation.
Cite this Research Publication : M. K. Jinesh, Bharat Jayaraman, and Dr. Krishnashree Achuthan, “Sybil Attack Detection in Vehicular Networks”, in Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations, CRC Press, 2016, pp. 35 -51