Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 24
Page No. 5038 - 5045

Hash Based Security for Malicious Attacks in Vanets

Authors : Y.S. Sardius Nithin and K.V.D. Kiran

Abstract: The Vehicular Ad hoc Networks (VANETs) have been accepting a lot of consideration in their field of remote portable systems administration on the grounds that VANETs are powerless against malevolent assaults. The decentralized lightweight verification plan called Trust-Extended Verification Procedure (TEVP) for vehicle-to-vehicle correspondence systems. Group embraces the idea of transitive trust connections to enhance the execution of the confirmation methodology and just needs a couple capacity rooms. Be that as it may, it is not adequate for discovery of Sybil assaults because of collaboration between the directions. Along these lines in this study we propose hash key disseminated framework and light-weight and adaptable structure to recognize Sybil assaults. To keep a vehicle from mishandling the aliases dispatch a Sybil assault hashing be utilized. Within goal framework, the division of motor vehicle gives vehicles an one of a kind pool of nom de plumes as concealing a vehicle’s one of a kind personality. Vehicle pen name put away in RSU Presently RSU assess hashed values and afterward decide nom de plumes same pool to diminish Sybil assault. The proposed pattern for the most part spotlights on identifying Sybil assault and gives security.

How to cite this article:

Y.S. Sardius Nithin and K.V.D. Kiran, 2016. Hash Based Security for Malicious Attacks in Vanets. Asian Journal of Information Technology, 15: 5038-5045.

Design and power by Medwell Web Development Team. © Medwell Publishing 2022 All Rights Reserved