scholarly journals Novel Secure Routing Protocol for Detecting and Preventing Sybil Attack

Author(s):  
Shankar M Sawant ◽  
Vikas T Ligade

Secure communication network is the demand of today’s transportation due to excess number of vehicles and limitation to the existing communication protocol. This Paper discusses the secure communication protocol between the vehicles and the detection and prevention of the Sybil attack. Fake node request, multiple routing entries these are the common example of Sybil attack which can be detected and prevented using existing proposed method. Virtual nodes are created and messages are sent to nodes. The proposed method detects the identity of received message and number of fake entries of that particular massage in the routing buffer. If messages are validated then communication is possible otherwise request is terminated. Results showed that the existing proposed method is able to detect and prevent Sybil attack by maintaining single node identity.

2020 ◽  
Vol 17 (12) ◽  
pp. 5543-5549
Author(s):  
N. SangeethaPriya ◽  
L. Bharathi ◽  
S. Dola Sanjay ◽  
N. V. D. P. Murthy ◽  
A. N. L. Harisha

Generally wireless sensor networks (WSN) are connected via a wireless medium to form a large amount of cooperative sensor nodes. Monitoring control is an important aspect of monitoring users in monitoring applications, such as wireless sensor networks, because of security. There are countless applications to pay for themselves but at the same time, their special properties offer a number of challenges, such as security and surveillance, control, and operation and complex system maintenance. WSN has already seen it on the Internet, from face-to-face security attacks. To propose an Optimal Multilevel Link extend umpiring routing (OML-EUR) based secure routing protocol for improving privacy standard in wireless sensor networks. Secure communication is also important in providing accurate and resource constraints at the sensor node at the moment. In this study, there are three of our contributions. Initially it monitors the neighbor network layer attacks for browsing the WSN on the transmission medium. Followed subscription a link establishment to monitoring the request packets through key transmission of WSN with secure routing protocols. By finding the secure communication as qualities of service verification among the modes to authenticate to transfer. The proposed system produce high secure performance by the result proves energy consumption and communication overhead as higher efficient than previous system.


2010 ◽  
Vol 2 (2) ◽  
pp. 62-78 ◽  
Author(s):  
Emmanouil A. Panaousis ◽  
Tipu A. Ramrekha ◽  
Grant P. Millar ◽  
Christos Politis

Sign in / Sign up

Export Citation Format

Share Document