CFP last date
20 August 2024
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2024

Submit your paper
Know more
Reseach Article

Various Techniques for Secure Routing in VANETs: A Review

by Prabhjot Kaur, Usvir Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 161 - Number 5
Year of Publication: 2017
Authors: Prabhjot Kaur, Usvir Kaur
10.5120/ijca2017913185

Prabhjot Kaur, Usvir Kaur . Various Techniques for Secure Routing in VANETs: A Review. International Journal of Computer Applications. 161, 5 ( Mar 2017), 1-4. DOI=10.5120/ijca2017913185

@article{ 10.5120/ijca2017913185,
author = { Prabhjot Kaur, Usvir Kaur },
title = { Various Techniques for Secure Routing in VANETs: A Review },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 161 },
number = { 5 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume161/number5/27141-2017913185/ },
doi = { 10.5120/ijca2017913185 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:07:35.502636+05:30
%A Prabhjot Kaur
%A Usvir Kaur
%T Various Techniques for Secure Routing in VANETs: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 161
%N 5
%P 1-4
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The vehicular adhoc networks is the type of network in which no central controller is present and due to which vehicle nodes may join or leave the network any time. In the vehicular adhoc network, vehicle to vehicle and vehicle to infrastructure type of communication is possible in the network. Due to self configuring nature of the network, many malicious nodes may join the network which is responsible to trigger various type of active and passive attacks. In this paper, techniques which are proposed to isolate and Sybil attack in the network are reviewed in terms of description and outcomes.

References
  1. M. Raya, & J.P. Hubaux, “Securing vehicular adhoc networks”, Journal of Computer Security, pp.39-68, 2007.
  2. S.Iqbal, S.R. Chowdhury, C. S. Hyder, A.V. Vasilakos, & C.X. Wang, “ Vehicular communication: protocol design, test bed implementation and performance analysis”, In Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly , pp. 410-415, 2009.
  3. B. Xiao, B.Yu., & C. Gao, “Detection and localization of Sybil nodes in VANETs”, In Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks pp. 1-8,2006.
  4. Y. Hao, J.Tang, Y. Cheng “Cooperative sybil attack detection for position based applications in privacy preserved VANETs” IEEE In Global Telecommunications Conference (GLOBECOM 2011), IEEE pp. 1-5,2011
  5. S. Chang, Q. Yong, H. Zhu, J. Zhao, X. Shen, “Footprint: Detecting sybil attacks in urban vehicular networks”, IEEE sponsored Parallel and Distributed Systems, IEEE Transactions on, 23(6), pp.1103-1114, 2011.
  6. S. Chang, Q. Yong, H. Zhu, J. Zhao, X. Shen, “Footprint: Detecting sybil attacks in urban vehicular networks”, IEEE sponsored Parallel and Distributed Systems, IEEE Transactions on, 23(6), pp.1103-1114, 2011.
  7. B. Lee, E. Jeong, & I. Jung, “A DTSA (Detection Technique against a Sybil Attack) Protocol using SKC (Session Key based Certificate) on VANET”, International Journal of Security & Its Applications, 7(3), pp.1-10, 2013.
  8. li. Mingxi, Y. Xiong, X. Zhou, Y.Sun, “ A Regional Statistics Detection Scheme against Sybil Attacks in WSNs”, IEEE Sponsored In Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on pp. 285-291, 2013.
  9. K. Rabieh, M. Younis,“ Cross-Layer Scheme for Detecting Large-Scale Colluding Sybil Attack in VANETs”, 2015,IEEE
  10. R. Kaur, M. Kaur,“ Isolation of Sybil Attack in VANET using Neighboring Information”, 2015, IEEE
  11. W. Han, B. Zang,” A robust detection of the Sybil Attack in urban VANETs”, 2009, IEEE
  12. M. C. Surugiu, R. V. Alexandrescu,” Study on the Implementation of Protocols for Providing Security in Average VANETs Intervehiculary Network Communication Systems”, 2015, IEEE
  13. T. Song, L. Shen,” A Cluster-Based Directional Routing Protocol in VANET”, 2010, IEEE
  14. T. Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty,” P2DAP Sybil Attacks Detection in Vehicular Ad Hoc Networks”, 2011, IEEE
  15. K. M. Rabieh, Marianne Amir Azer,” Combating Sybil Attacks in Vehicular Ad Hoc Networks”, Communications in Computer and Information Science, 2011, Volume 162, pp 65-722011
  16. M. Fogue, Francisco J. Martinez, Piedad Garrido, Marco Fiore, Carla-Fabiana Chiasserini, Claudio Casetti, Juan-Carlos,“ On the use of a cooperative neighbour position verification scheme to secure warning message dissemination in VANETs”, 2013, IEEE, ISSN: 0742-1303
  17. C. Campolo, A. Vinel, A. Molinaro, Y. Koucheryavy,“ Modeling broadcasting in IEEE 802.11p/WAVE vehicular Networks”, 2011, IEEE, ISSN: 1089-7798
  18. M. Abu-Elkheir, S. A. Hamid, Hossam S. Hassanein, I Brahim M. Elhenawy, Samir Elmougy,“ Position Verification for Vehicular Networks via Analyzing Two-hop Neighbors Information”, 2011, IEEE, INSPEC Accession Number: 12506231
Index Terms

Computer Science
Information Sciences

Keywords

VANET SYBIL ACTIVE and PASSIVE