International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 100 - Issue 15 |
Published: August 2014 |
Authors: Sagar Narang, Kundan Munjal |
![]() |
Sagar Narang, Kundan Munjal . Strategical Comparison: Recognizing and Evicting Sybil Attack in Vehicular Ad Hoc Networks. International Journal of Computer Applications. 100, 15 (August 2014), 27-34. DOI=10.5120/17602-8216
@article{ 10.5120/17602-8216, author = { Sagar Narang,Kundan Munjal }, title = { Strategical Comparison: Recognizing and Evicting Sybil Attack in Vehicular Ad Hoc Networks }, journal = { International Journal of Computer Applications }, year = { 2014 }, volume = { 100 }, number = { 15 }, pages = { 27-34 }, doi = { 10.5120/17602-8216 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2014 %A Sagar Narang %A Kundan Munjal %T Strategical Comparison: Recognizing and Evicting Sybil Attack in Vehicular Ad Hoc Networks%T %J International Journal of Computer Applications %V 100 %N 15 %P 27-34 %R 10.5120/17602-8216 %I Foundation of Computer Science (FCS), NY, USA
Vehicular Ad-Hoc Networks (VANET) generalization of Mobile Ad Hoc Networks (MANET) are proclaimed for extreme mobility as compared to MANET. Motivation of VANET is Traffic Administration and Human Protection. Misuse of utilities provided by VANET is more prone to attacks like Black Hole Attack and Sybil Attack. This paper is fascinated towards recognition and eviction of Sybil Attack in VANET. In Sybil Attack evil-minded nodes known as Sybil nodes imitates multiple fraud identities of one vehicle at same time distorting behavior of right-minded nodes in network vulnerable to human lives. In this paper, different strategies of finding, locating and evicting Sybil Nodes in VANET are suggested and differentiated.