Reference Hub12
A Taxonomy of Sybil Attacks in Vehicular Ad-Hoc Network (VANET)

A Taxonomy of Sybil Attacks in Vehicular Ad-Hoc Network (VANET)

Nirbhay Kumar Chaubey, Dhananjay Yadav
ISBN13: 9781799825708|ISBN10: 1799825701|EISBN13: 9781799825722
DOI: 10.4018/978-1-7998-2570-8.ch009
Cite Chapter Cite Chapter

MLA

Chaubey, Nirbhay Kumar, and Dhananjay Yadav. "A Taxonomy of Sybil Attacks in Vehicular Ad-Hoc Network (VANET)." IoT and Cloud Computing Advancements in Vehicular Ad-Hoc Networks, edited by Ram Shringar Rao, et al., IGI Global, 2020, pp. 174-190. https://doi.org/10.4018/978-1-7998-2570-8.ch009

APA

Chaubey, N. K. & Yadav, D. (2020). A Taxonomy of Sybil Attacks in Vehicular Ad-Hoc Network (VANET). In R. Rao, V. Jain, O. Kaiwartya, & N. Singh (Eds.), IoT and Cloud Computing Advancements in Vehicular Ad-Hoc Networks (pp. 174-190). IGI Global. https://doi.org/10.4018/978-1-7998-2570-8.ch009

Chicago

Chaubey, Nirbhay Kumar, and Dhananjay Yadav. "A Taxonomy of Sybil Attacks in Vehicular Ad-Hoc Network (VANET)." In IoT and Cloud Computing Advancements in Vehicular Ad-Hoc Networks, edited by Ram Shringar Rao, et al., 174-190. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2570-8.ch009

Export Reference

Mendeley
Favorite

Abstract

Vehicular ad hoc networks (VANETs) are a class of ad hoc networks in which vehicle communicate with each other to show the traffic situation and any mishappening on the road. VANET is vulnerable to a number of attacks due to its infrastructure-less nature. One of these attacks is the Sybil attack. Security of data dissemination in VANET is very crucial, otherwise any mishappening can occur on road. Sybil attack is very difficult to be defended and detected, especially when it is launched by some conspired attackers using their legitimate identities, and this has become a growing research interest in VANETs in past few years. This chapter studies various dimension of VANETs including its structure, communication architecture, security issues, and critical review of technique to detect Sybil attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.