Main Reference PaperFootprint: Detecting Sybil Attacks in Urban Vehicular Networks, IEEE Transactions on Parallel and Distributed Systems, June 2012.
  • An innovative Sybil attack detection technique is presented in this project for the protection of anonymity and location privacy through the exploitation of trajectories for the identification of vehicle. Proposed technique involves signer ambiguous signature scheme which results in location-hidden authorized message.

+ Description
  • An innovative Sybil attack detection technique is presented in this project for the protection of anonymity and location privacy through the exploitation of trajectories for the identification of vehicle. Proposed technique involves signer ambiguous signature scheme which results in location-hidden authorized message.

  • To detect the Sybil attack rapidly before the attack gets termination

  • To identify the vehicle while preserving anonymity and location privacy through location-hidden authorization messages

+ Aim & Objectives
  • To detect the Sybil attack rapidly before the attack gets termination

  • To identify the vehicle while preserving anonymity and location privacy through location-hidden authorization messages

  • A protection scheme is contributed against corrupted RSUs. Using voting protocol TA determines compromised RSU. If the number of suspicious vote on a particular RSU is higher, TA accuses the RSU and revokes it from the network.

+ Contribution
  • A protection scheme is contributed against corrupted RSUs. Using voting protocol TA determines compromised RSU. If the number of suspicious vote on a particular RSU is higher, TA accuses the RSU and revokes it from the network.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.