International Organization of Research & Development (IORD)
In vehicular area, where privacy of vehicle, mainly the location of vehicle i.e. privacy of anonymous vehicles, is highly not tracking, nameless verification of vehicles is impossible to discuss or distinction. A malicious node (attacker in network) who tries to forging multiple same false identities of the node available in the network can easily launch an attack called Sybil attack, gaining a suspiciously large influence. In this paper, the authors mentioned a simple Sybil attack occur in the network using the trajectories of vehicles for identification of the node while at rest maintaining the node location privacy in the network.