Main Reference PaperP2DAP – Sybil Attacks Detection in Vehicular Ad Hoc Networks, IEEE Journal on Selected Areas in communications, march 2011
  • In the proposed technique, a malicious user pretending to be multiple vehicles can be detected in a distributed manner through passive overhearing by s set of fixed nodes called road-side boxes (RSBs). The RSB is securely connected to the DMV via a backhaul wired network. The DMV plays the role of a certificate authority (CA), and has the ability to manage vehicle registration, ownership, and other administrative policies.

+ Description
  • In the proposed technique, a malicious user pretending to be multiple vehicles can be detected in a distributed manner through passive overhearing by s set of fixed nodes called road-side boxes (RSBs). The RSB is securely connected to the DMV via a backhaul wired network. The DMV plays the role of a certificate authority (CA), and has the ability to manage vehicle registration, ownership, and other administrative policies.

  • The security and privacy concerns (Sybil attacks) in VANET is eliminated by Lightweight and scalable protocol.

  • The RSB is securely connected to the DMV via a backhaul wired network.

  • Vehicles are expected to obtain a new pseudonym from a trusted Department of Motor vehicles (DMV) (serving as a CA) immediately before the earlier pseudonym expires.

+ Aim & Objectives
  • The security and privacy concerns (Sybil attacks) in VANET is eliminated by Lightweight and scalable protocol.

  • The RSB is securely connected to the DMV via a backhaul wired network.

  • Vehicles are expected to obtain a new pseudonym from a trusted Department of Motor vehicles (DMV) (serving as a CA) immediately before the earlier pseudonym expires.

  • DRP protocol is used to revoke the certificate of malicious vehicle is to be proposed. The main principle of DRP is simple: the neighbors of the attacker vehicle take care of detecting and temporarily revoking it. DRP is a warning system against attackers.

+ Contribution
  • DRP protocol is used to revoke the certificate of malicious vehicle is to be proposed. The main principle of DRP is simple: the neighbors of the attacker vehicle take care of detecting and temporarily revoking it. DRP is a warning system against attackers.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.