{"title":"在vanet中检测和减轻Sybil攻击的防御性时间戳方法","authors":"Shikha Sharma, Shivani Sharma","doi":"10.1109/IC3I.2016.7917994","DOIUrl":null,"url":null,"abstract":"Sybil attack is an encounter in which the personality of a assaulter is contaminated into huge number of incognito personality which is produced to build up the route of the network. In this paper, we deliberate the timestamp approach for Sybil attack in associated system, self correlate network, and cordial network system. Also assorted mechanisms to extenuate the Sybil attack are evaluated, we have proposed timestamp approach for prevention and detection of Sybil attack. We have compared our result with EBRS Approach our approach shows better results as compared to previous approach.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"A defensive timestamp approach to detect and mitigate the Sybil attack in vanet\",\"authors\":\"Shikha Sharma, Shivani Sharma\",\"doi\":\"10.1109/IC3I.2016.7917994\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Sybil attack is an encounter in which the personality of a assaulter is contaminated into huge number of incognito personality which is produced to build up the route of the network. In this paper, we deliberate the timestamp approach for Sybil attack in associated system, self correlate network, and cordial network system. Also assorted mechanisms to extenuate the Sybil attack are evaluated, we have proposed timestamp approach for prevention and detection of Sybil attack. We have compared our result with EBRS Approach our approach shows better results as compared to previous approach.\",\"PeriodicalId\":305971,\"journal\":{\"name\":\"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3I.2016.7917994\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I.2016.7917994","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A defensive timestamp approach to detect and mitigate the Sybil attack in vanet
Sybil attack is an encounter in which the personality of a assaulter is contaminated into huge number of incognito personality which is produced to build up the route of the network. In this paper, we deliberate the timestamp approach for Sybil attack in associated system, self correlate network, and cordial network system. Also assorted mechanisms to extenuate the Sybil attack are evaluated, we have proposed timestamp approach for prevention and detection of Sybil attack. We have compared our result with EBRS Approach our approach shows better results as compared to previous approach.