SlideShare a Scribd company logo
1 of 11
Submitted to
Ch.Anusha Mam

Presented by
Y.Keerthi Reddy.
V.Triveni.
K.T.V.N.Lakshmi

Footprint: Detecting Sybil Attacks in
Urban Vehicular Networks
Footprint: Detecting Sybil Attacks in Urban Vehicular
Networks
Abstract

We propose a novel Sybil attack detection
system that detects the attack in urban vehicular
systems using footprint scheme in which the
trajectory of the vehicle is formed and vehicle’s
location is found from the consecutive messages
sent by the vehicle to RSU. At the same time
location privacy is also preserved using signature
scheme.
Existing System
• In existing system, hackers easily can act as source node
and sends message to destination.
• Destination receives wrong message from hackers.
• Destination believes that its correct message from source.
• Destination receives the wrong information from hackers.
• Messages are passed from sender to destination (receiver)
without any security.
• Message header holds source node information which
sends the message to receiver.
• Hackers can easily change that header information and
sends to destination.
Proposed System
• In this proposed system, hackers can not act as source,
because one centralized server is maintaining to check
authentication of source.
• This centralized server is sybil guard.
• It blacks unauthorized users or hackers.
• Sybil guard is maintaining source node information and
header information of message.
• It checks the users using those details whether they are
attackers or normal user.
• Hacker’s information has not been transferred to
destination.
• Destination has not been receiving any attacker
information.
Modules

•
•
•
•

Topology Construction
Node entry
Message transmission
Sybil guard
Topology Construction
• Topology construction is designed to construct one
topology with available nodes.
• Register all nodes which are involved to transfer the
data to some other nodes.
• Depends upon total nodes, topology will be
constructed.
• Topology construction module allows you to construct
node path.
• If already exits, it will not allow to construct that same
path.
• All nodes are mentioned in topology construction. User
can’t modify node information after construction.
Node Entry
• Node entry module describes node
authentication.
• To activate node who are all involved in topology,
node should be login into that topology.
• It does not allow unauthorized node entry. Many
nodes can enter into that mentioned topology.
• Each node can send the messages to their
destination after login.
Message Transmission

• Each node (source node) can send the data to
some other node(destination) which one
connected with that source node.
• While sending message, the source node
should mention the header information.
• Source node can send the data to destination.
Destination will receive that message.
Sybil Guard

• Sybil guard is maintained in this project to detect the
attacker.
• Sybil guard is called as centralized server. Sybil guard
does not allow hackers to send the wrong data. It
compares node information and header information.
• If matches, normal user sending the message to
destination.
• Otherwise sybil guard will not allow the hackers to
send message.
• It blocks that data and it provides the attacker
information to attacker.
System Requirements

Software Requirements
• Language:
Java 1.5 or more
• Backend:
Sql sever
• Operating System
Windows Xp

:

Hardware Requirements
• Hard disk :
80 GB
• SDRAM :
256 MB
• Processor :
P IV
• Processor Speed:
2.33 GHz

More Related Content

Similar to Footprint: Detecting Sybil Attacks in Urban Vehicular Network

Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01
Gaurav Goyal
 
Anon p2p slides
Anon p2p slidesAnon p2p slides
Anon p2p slides
chintaan
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
raosg
 
Osi model
Osi model Osi model
Osi model
maha tce
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
Muqeed Abdul
 
Iaetsd a layered security approach through femto cell using
Iaetsd a layered security approach through femto cell usingIaetsd a layered security approach through femto cell using
Iaetsd a layered security approach through femto cell using
Iaetsd Iaetsd
 

Similar to Footprint: Detecting Sybil Attacks in Urban Vehicular Network (20)

Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Cryptography based misbehavior detection for opportunistic network
Cryptography based misbehavior detection for opportunistic networkCryptography based misbehavior detection for opportunistic network
Cryptography based misbehavior detection for opportunistic network
 
Anonymous traffic network
Anonymous traffic networkAnonymous traffic network
Anonymous traffic network
 
lecture 7.pptx
lecture 7.pptxlecture 7.pptx
lecture 7.pptx
 
Securing Governmental Public Services with Free/Open Source Tools - Egyptian ...
Securing Governmental Public Services with Free/Open Source Tools - Egyptian ...Securing Governmental Public Services with Free/Open Source Tools - Egyptian ...
Securing Governmental Public Services with Free/Open Source Tools - Egyptian ...
 
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
 
Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
 
Anon p2p slides
Anon p2p slidesAnon p2p slides
Anon p2p slides
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
ds2p1.pptx
ds2p1.pptxds2p1.pptx
ds2p1.pptx
 
New Security Threats and Protection Techniques in Mobile Ad Hoc Networks
New Security Threats and Protection Techniques in Mobile Ad Hoc NetworksNew Security Threats and Protection Techniques in Mobile Ad Hoc Networks
New Security Threats and Protection Techniques in Mobile Ad Hoc Networks
 
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc NetworksSurvey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
 
Copy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdfCopy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdf
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
Osi model
Osi model Osi model
Osi model
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasures
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)
 
Iaetsd a layered security approach through femto cell using
Iaetsd a layered security approach through femto cell usingIaetsd a layered security approach through femto cell using
Iaetsd a layered security approach through femto cell using
 

More from Keerthi Reddy Yeruva (6)

Privacy and integrity-preserving range queries
Privacy and integrity-preserving range queriesPrivacy and integrity-preserving range queries
Privacy and integrity-preserving range queries
 
Paper Battery
Paper BatteryPaper Battery
Paper Battery
 
Bluetooth(Bluetooth option missing from "Send to" menu in Window)
Bluetooth(Bluetooth option missing from "Send to" menu in Window)Bluetooth(Bluetooth option missing from "Send to" menu in Window)
Bluetooth(Bluetooth option missing from "Send to" menu in Window)
 
Brain Gate System
Brain Gate SystemBrain Gate System
Brain Gate System
 
Abortion
AbortionAbortion
Abortion
 
Photovoltaic retinal prosthesis for restoring sight to the blind
Photovoltaic retinal prosthesis for restoring sight to the blindPhotovoltaic retinal prosthesis for restoring sight to the blind
Photovoltaic retinal prosthesis for restoring sight to the blind
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Recently uploaded (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Footprint: Detecting Sybil Attacks in Urban Vehicular Network

  • 1. Submitted to Ch.Anusha Mam Presented by Y.Keerthi Reddy. V.Triveni. K.T.V.N.Lakshmi Footprint: Detecting Sybil Attacks in Urban Vehicular Networks
  • 2. Footprint: Detecting Sybil Attacks in Urban Vehicular Networks
  • 3. Abstract We propose a novel Sybil attack detection system that detects the attack in urban vehicular systems using footprint scheme in which the trajectory of the vehicle is formed and vehicle’s location is found from the consecutive messages sent by the vehicle to RSU. At the same time location privacy is also preserved using signature scheme.
  • 4. Existing System • In existing system, hackers easily can act as source node and sends message to destination. • Destination receives wrong message from hackers. • Destination believes that its correct message from source. • Destination receives the wrong information from hackers. • Messages are passed from sender to destination (receiver) without any security. • Message header holds source node information which sends the message to receiver. • Hackers can easily change that header information and sends to destination.
  • 5. Proposed System • In this proposed system, hackers can not act as source, because one centralized server is maintaining to check authentication of source. • This centralized server is sybil guard. • It blacks unauthorized users or hackers. • Sybil guard is maintaining source node information and header information of message. • It checks the users using those details whether they are attackers or normal user. • Hacker’s information has not been transferred to destination. • Destination has not been receiving any attacker information.
  • 7. Topology Construction • Topology construction is designed to construct one topology with available nodes. • Register all nodes which are involved to transfer the data to some other nodes. • Depends upon total nodes, topology will be constructed. • Topology construction module allows you to construct node path. • If already exits, it will not allow to construct that same path. • All nodes are mentioned in topology construction. User can’t modify node information after construction.
  • 8. Node Entry • Node entry module describes node authentication. • To activate node who are all involved in topology, node should be login into that topology. • It does not allow unauthorized node entry. Many nodes can enter into that mentioned topology. • Each node can send the messages to their destination after login.
  • 9. Message Transmission • Each node (source node) can send the data to some other node(destination) which one connected with that source node. • While sending message, the source node should mention the header information. • Source node can send the data to destination. Destination will receive that message.
  • 10. Sybil Guard • Sybil guard is maintained in this project to detect the attacker. • Sybil guard is called as centralized server. Sybil guard does not allow hackers to send the wrong data. It compares node information and header information. • If matches, normal user sending the message to destination. • Otherwise sybil guard will not allow the hackers to send message. • It blocks that data and it provides the attacker information to attacker.
  • 11. System Requirements Software Requirements • Language: Java 1.5 or more • Backend: Sql sever • Operating System Windows Xp : Hardware Requirements • Hard disk : 80 GB • SDRAM : 256 MB • Processor : P IV • Processor Speed: 2.33 GHz