• Save
Footprint: Detecting Sybil Attacks in Urban Vehicular Networks
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Footprint: Detecting Sybil Attacks in Urban Vehicular Networks

on

  • 748 views

For more projects visit@www.nanocdac.com

For more projects visit@www.nanocdac.com

Statistics

Views

Total Views
748
Views on SlideShare
748
Embed Views
0

Actions

Likes
1
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft Word

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Footprint: Detecting Sybil Attacks in Urban Vehicular Networks Document Transcript

  • 1. Footprint: Detecting Sybil Attacks in Urban Vehicular NetworksAbstractIn urban vehicular networks, where privacy, especially the location privacy ofanonymous vehicles is highly concerned, anonymous verification of vehicles is indispensable.Consequently, an attacker who succeeds in forging multiple hostile identifies can easily launch aSybil attack, gaining a disproportionately large influence. In this paper, we propose a novel Sybilattack detection mechanism, Footprint, using the trajectories of vehicles for identification whilestill preserving their location privacy. More specifically, when a vehicle approaches a road-sideunit (RSU), it actively demands an authorized message from the RSU as the proof of theappearance time at this RSU. We design a location-hidden authorized message generationscheme for two objectives: first, RSU signatures on messages are signer ambiguous so that theRSU location information is concealed from the resulted authorized message; second, twoauthorized messages signed by the same RSU within the same given period of time (temporarilylinkable) are recognizable so that they can be used for identification. With the temporallimitation on the likability of two authorized messages, authorized messages used for long-termidentification are prohibited. With this scheme, vehicles can generate a location-hidden trajectoryfor location-privacy-preserved identification by collecting a consecutive series of authorizedmessages. Utilizing social relationship among trajectories according to the similarity definitionof two trajectories, Footprint can recognize and therefore dismiss “communities” of Sybiltrajectories. Rigorous security analysis and extensive trace-driven simulations demonstrate theefficacy of Footprint.Existing systemIn existing system, hackers easily can act as source node and sends message todestination. Destination receives wrong message from hackers. Destination believes that itscorrect message from source. Destination receives the wrong information from hackers.www.nanocdac.com www.nsrcnano.com branches: hyderabad nagpur
  • 2. Messages are passed from sender to destination (receiver) without any security. Message headerholds source node information which sends the message to receiver. Hackers can easily changethat header information and sends to destination.DisadvantagesDestination gets the wrong information from hackers or malicious user. There is no anyserver to detect hackers. Header information may be hiding by malicious user. Source node doesnot get any response from destination while hackers get that source information.PROPOSED SYSTEMIn this proposed system, hackers cannot act as source, because one centralized server ismaintaining to check authentication of source. This centralized server is Sybil guard. It blacksunauthorized users or hackers. Sybil guard is maintaining source node information and headerinformation of message. It checks the users using those details whether they are attackers ornormal user. Hacker’s information has not been transferred to destination. Destination has notbeen receiving any attacker information.ADVANTAGESSybil guard is maintained to detect the attackers who are all act as source node. It deletesthat wrong information from hackers and indicates that they are attackers. Hackers’ informationhas not transferred to receiver. Sybil guard act as the centralized server to all users. It handles themessage transmission between those users. Each user has to register individually. That userinformation’s are stored in centralized server and find the attackers using that information.Software Requirement SpecificationSoftware SpecificationOperating System : Windows XPTechnology : JAVA 1.6Database : SQL Server 2005www.nanocdac.com www.nsrcnano.com branches: hyderabad nagpur
  • 3. Minimum Hardware SpecificationProcessor : Pentium IVRAM : 512 MBHard Disk : 80GBwww.nanocdac.com www.nsrcnano.com branches: hyderabad nagpur
  • 4. Modules• Topology Construction• Node entry• Message transmission• Sybil guardwww.nanocdac.com www.nsrcnano.com branches: hyderabad nagpur