Trajectory Based Sybil Attacks Detection for Vehicular Ad-hoc Networks

Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these \"Sybil attacks\" is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.

Provided by: International Journal of Computer & Organization Trends(IJCOT) Topic: Security Date Added: Jul 2013 Format: PDF

Find By Topic