VANILLA ATTACK DETECTION BY WORK AND LOCATION PROOFS

Authors

  • S.Saritha Author
  • P.Dhanalaxmi Author
  • P.Aswini Author
  • Mr.B.Sudheer Reddy Author

DOI:

https://doi.org/10.62643/

Abstract

The next generation of Intelligent Transportation Systems (ITS) may be made possible via Vehicular Ad Hoc Networks (VANETs). Improved road safety and less congestion are two outcomes of intelligent transport systems (ITS) that use vehicle-generated data to construct a spatio-temporal picture of traffic statistics. Vehicles should utilise many pseudonyms rather than a single identity in order to protect drivers' privacy. But cars might take advantage of all the pseudonyms out there and conduct Sybil assaults by posing as other vehicles. The Sybil (or fictitious) cars then provide erroneous information, such as to inflate the severity of traffic jams or skew traffic management statistics. Here, we provide a method for detecting Sybil attacks that makes use of location and proofs of work. Each roadside unit (RSU) is supposed to provide a signed, time-stamped tag to verify the vehicle's anonymous whereabouts. Vehicle anonymous identification is based on a trajectory that is created using proofs transmitted by many successive RSUs. Furthermore, in order to generate trajectories, it takes the efforts of several RSUs, not just one. Thus, in order to generate false trajectories, attackers would have to corrupt an unrealistically high number of RSUs. In addition, when an RSU has provided the evidence of location, the car should use the proof of work (PoW) technique to solve a computational challenge. After then, in order to get a proof of location, it has to provide the next RSU a correct solution, also called proof of work. When dealing with low-density RSUs, the PoW may stop the vehicles from generating numerous trajectories. In order for the vehicle to notify an event manager, it must transmit the most recent trajectory. After then, trajectories sent by Sybil cars are identified by the event manager using a matching algorithm. For the plan to work, the Sybil trajectories must overlap as they are physically connected to the same vehicle.

Downloads

Published

20-06-2024

How to Cite

VANILLA ATTACK DETECTION BY WORK AND LOCATION PROOFS. (2024). International Journal of Engineering Research and Science & Technology, 20(2), 1252-1258. https://doi.org/10.62643/