Comparision of AODV and Directed Diffusion Routing Protocol under Flooding and Sybil Attack

2014 ◽  
Vol 1 (2) ◽  
pp. 19-33
Author(s):  
Navroz Kahlon ◽  
2021 ◽  
pp. 393-398
Author(s):  
S. M. Sawant ◽  
S. M. Shinde ◽  
J. S. Shinde

2011 ◽  
Vol 17 (8) ◽  
pp. 1035-1047 ◽  
Author(s):  
Gui Jing-Jing ◽  
Wang Jin-Shuang ◽  
Zhang Yu-Sen ◽  
Zhang Tao

2021 ◽  
Author(s):  
Shankar M Sawant ◽  
Vikas T Ligade

Secure communication network is the demand of today’s transportation due to excess number of vehicles and limitation to the existing communication protocol. This Paper discusses the secure communication protocol between the vehicles and the detection and prevention of the Sybil attack. Fake node request, multiple routing entries these are the common example of Sybil attack which can be detected and prevented using existing proposed method. Virtual nodes are created and messages are sent to nodes. The proposed method detects the identity of received message and number of fake entries of that particular massage in the routing buffer. If messages are validated then communication is possible otherwise request is terminated. Results showed that the existing proposed method is able to detect and prevent Sybil attack by maintaining single node identity.


ALERT chiefly uses irregular message routing copy to supply namelessness protection. The projected protocol provides the ALERT routing high namelessness protection, EALERT additionally dynamically partitions a network field into zones and haphazardly chooses nodes in zones as intermediate relay nodes, that Anon-traceable anonymous route. It then haphazardly chooses a node inside the choice zone as a result of subsequent relay node and uses the EGPSR formula as a variant of GPSR in awake to send the information to the relay node. Within the last step, the information is broadcasted to k nodes at intervals the destination zone, providing k-anonymity to the destination. In addition, the protocol contains a method to hide the information instigator among sort of initiators to strengthen the k-anonymity protection of the provision. The projected Energy aware ALERT detects the Sybil attack within the network, Routing protocol, geographical routing


Author(s):  
Xinying Yu ◽  
Fengyin Li ◽  
Tao Li ◽  
Nan Wu ◽  
Hua Wang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document