files/journal/2022-09-02_11-59-20-000000_418.png

Asian Journal of Information Technology

ISSN: Online 1993-5994
ISSN: Print 1682-3915
109
Views
1
Downloads

Hash Based Security for Malicious Attacks in Vanets

Y.S. Sardius Nithin and K.V.D. Kiran
Page: 5038-5045 | Received 21 Sep 2022, Published online: 21 Sep 2022

Full Text Reference XML File PDF File

Abstract

The Vehicular Ad hoc Networks (VANETs) have been accepting a lot of consideration in their field of remote portable systems administration on the grounds that VANETs are powerless against malevolent assaults. The decentralized lightweight verification plan called Trust-Extended Verification Procedure (TEVP) for vehicle-to-vehicle correspondence systems. Group embraces the idea of transitive trust connections to enhance the execution of the confirmation methodology and just needs a couple capacity rooms. Be that as it may, it is not adequate for discovery of Sybil assaults because of collaboration between the directions. Along these lines in this study we propose hash key disseminated framework and light-weight and adaptable structure to recognize Sybil assaults. To keep a vehicle from mishandling the aliases dispatch a Sybil assault hashing be utilized. Within goal framework, the division of motor vehicle gives vehicles an one of a kind pool of nom de plumes as concealing a vehicle’s one of a kind personality. Vehicle pen name put away in RSU Presently RSU assess hashed values and afterward decide nom de plumes same pool to diminish Sybil assault. The proposed pattern for the most part spotlights on identifying Sybil assault and gives security.


How to cite this article:

Y.S. Sardius Nithin and K.V.D. Kiran. Hash Based Security for Malicious Attacks in Vanets.
DOI: https://doi.org/10.36478/ajit.2016.5038.5045
URL: https://www.makhillpublications.co/view-article/1682-3915/ajit.2016.5038.5045