Loading

Hash Based Co-Operative Method to Handle Sybil Attack Sequences in Vehicular Ad Hoc Networks
B. V. S. P. Pavan Kumar1, S. S. V. N. Sharma2
1B.V. S.P. Pavan Kumar, Professor, Malla Reddy Engineering College, For Women Hyderabad (Telangana), India.
2Dr. S.S. V.N. Sharma, Professor, Vagadevi Engineering College, Warangal (Telangana), India.
Manuscript received on 18 August 2019 | Revised Manuscript received on 29 August 2019 | Manuscript Published on 06 September 2019 | PP: 993-999 | Volume-8 Issue- 6S, August 2019 | Retrieval Number: F11900886S19/19©BEIESP | DOI: 10.35940/ijeat.F1190.0886S19
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Vehicular without any preparation arrange (VANETs) being stretched out to depict kept up for traffic control systems, stay away from misfortune oriented_ information relations, stopping and information correspondence in remote structure structures. Protection and security are generally two _concerns in vehicular _ad hoc systems. Dreadfully, _VANET have absolute best _privacy safeguarding ways to deal with oversee fragile Sybil assaults, where a malignant client can be familiar and indicate with be different vehicles. VANETs by making hallucination organized traffic deter. So that in this paper, we propose and develop Hash based Co-operative and Cryptographic Approach to handle Sybil attacks. This approach consists statistical approach to identify and verify vehicle information (id, ip address and where it is from and other details) and develop HMAC (Hash based Message Authentication Codes) encryption approach to detect Sybil attacks from forgery oriented attack sequences. Finally based on US map data available in VANET basic security web site, we generate different simulations to evaluate efficiency and feasibility of proposed approach. Our schema supports Sybil attacks detection without any support of outside positioning environment. Our experimental results show efficient result communication over detection of Sybil attacks in wireless network communication.
Keywords: Vehicular Ad Hoc Networks, Position Verification, Cryptography, Hashing And Sybil Attack.
Scope of the Article: Adhoc and Sensor Networks