Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm

A Kumar, V Varadarajan, A Kumar, P Dadheech… - Microprocessors and …, 2021 - Elsevier
attacks like DOS attack, Sybil Attack, Man-In-The-Middle … As both VANET and MANET are
easy to set up and use, they are … The location-based routing provides a multiple-hop approach …

Security and privacy challenges in vehicular ad hoc networks

M Obaidat, M Khodjaeva, J Holst, M Ben Zid - Connected Vehicles in the …, 2020 - Springer
… Just like MANETs, VANETs are vulnerable to many kinds of … be preserved through providing
anonymity of the message source … Sybil Attack: An adversary injects false information into a …

[PDF][PDF] Expressive and Deployable Swarm Intelligence Based Cybersecurity for Wireless Sensor Network

I Govindharajn, P Jeeva, M Kanimozhi, S Kodieswari… - 2019 - academia.edu
… We propose several new defenses against the Sybil attack, … Sybil attacker can disrupt
location-based or multipath routing … not suitable for the mobile ad hoc networks because it usually …

Malicious node and malicious observer node detection system in MANETs

S Durga Devi, D Rukmani Devi - … and Computation: Practice …, 2021 - Wiley Online Library
… and Sybil attack detection methods are used to detect Sybil … An authenticated anonymous
secure routing scheme is used … The anonymous location-based efficient routing protocol (…

An Enhanced Location-Aided Ant Colony Routing for Secure Communication in Vehicular Ad Hoc Networks

R Ramamoorthy - Human-Centric Intelligent Systems, 2024 - Springer
… the characteristics of mobile ad hoc networks (MANETs) with … [15] improve location-based
routing by adding location privacy … high level of robustness against blackhole and Sybil attacks. …

Performance Evaluation of Trust Management in Mobile Ad-hoc Networks

H Jari - 2023 - theses.ncl.ac.uk
validation of novel techniques, protocols, and algorithms in realistic … Sybil Attack: In a Sybil
attack, a malicious node creates … Despite these challenges, node location-based trust systems …

Privacy-preserving history-based routing in Opportunistic Networks

S Rashidibajgan, R Doss - Computers & Security, 2019 - Elsevier
… Opportunistic Networks (OppNets) are a subset of mobile ad-hoc networks (MANETs) in …
not resist against Sybil attacks. The main focus of this algorithm is to provide anonymity and …

Towards a secure ITS: Overview, challenges and solutions

L Sleem, HN Noura, R Couturier - Journal of Information Security and …, 2020 - Elsevier
… that should protect the WAVE stations from various attacks. In … compared to other kinds of
MANET network such as WSN, … : (a) user authentication to prevent Sybil attacks and prevent …

A detailed tutorial survey on VANETs: Emerging architectures, applications, security issues, and solutions

S Sharma, A Kaul, S Ahmed… - International Journal of …, 2021 - Wiley Online Library
… to enforce a certain degree of anonymity in the network. … Routing Protocols designed for
MANET will not work for VANET … Sybil attack is also known as an identity spoofing attack, which …

[PDF][PDF] Crowd Sourced Mobile Mapping Services

K Priyadharshini, K Mohanapriya, P Muthulakshmi… - academia.edu
… For location-based services, these attacks as doable as a … We start by looking at the limits of
the large-scale Sybil attacks … device location authentication, our proposed defense is a Sybil