NANO SCIENTIFIC RESEARCH CENTRE PVT.LTD., AMEERPET, HYD
WWW.NSRCNANO.COM, 09640648777, 09652926926
JAVA PROJECTS LIST--2013
JAVA 2013 IEEE PAPERS
Footprint: Detecting Sybil Attacks in Urban Vehicular Networks
Abstract
In
urban vehicular networks, where privacy, especially the location privacy of
anonymous vehicles is highly concerned, anonymous verification of vehicles is
indispensable. Consequently, an attacker who succeeds in forging multiple
hostile identifies can easily launch a Sybil attack, gaining a
disproportionately large influence. In this paper, we propose a novel Sybil
attack detection mechanism, Footprint, using the trajectories of vehicles for
identification while still preserving their location privacy. More
specifically, when a vehicle approaches a road-side unit (RSU), it actively
demands an authorized message from the RSU as the proof of the appearance time
at this RSU. We design a location-hidden authorized message generation scheme for two objectives: first, RSU
signatures on messages are signer ambiguous so that the RSU location
information is concealed from the resulted authorized message; second, two authorized messages signed by the same RSU
within the same given period of time (temporarily linkable) are recognizable so
that they can be used for identification. With the temporal limitation on the
likability of two authorized messages, authorized messages used for long-term identification
are prohibited. With this scheme, vehicles can generate a location-hidden
trajectory for location-privacy-preserved identification by collecting a
consecutive series of authorized
messages. Utilizing social relationship among trajectories according to
the similarity definition of two trajectories, Footprint can recognize and
therefore dismiss “communities” of Sybil trajectories. Rigorous security
analysis and extensive trace-driven simulations demonstrate the efficacy of
Footprint.
Existing
system
In
existing system, hackers easily can act as source node and sends message to
destination. Destination receives wrong message from hackers. Destination
believes that its correct message from source. Destination receives the wrong
information from hackers. Messages are passed from sender to destination
(receiver) without any security. Message header holds source node information
which sends the message to receiver. Hackers can easily change that header
information and sends to destination.
Disadvantages
Destination
gets the wrong information from hackers or malicious user. There is no any
server to detect hackers. Header information may be hiding by malicious user.
Source node does not get any response from destination while hackers get that
source information.
PROPOSED
SYSTEM
In
this proposed system, hackers cannot act as source, because one centralized
server is maintaining to check authentication of source. This centralized
server is Sybil guard. It blacks unauthorized users or hackers. Sybil guard is
maintaining source node information and header information of message. It
checks the users using those details whether they are attackers or normal user.
Hacker’s information has not been transferred to destination. Destination has
not been receiving any attacker information.
ADVANTAGES
Sybil
guard is maintained to detect the attackers who are all act as source node. It
deletes that wrong information from hackers and indicates that they are
attackers. Hackers’ information has not
transferred to receiver. Sybil guard act as the centralized server to all
users. It handles the message transmission between those users. Each user has
to register individually. That user information’s are stored in centralized
server and find the attackers using that information.
Software
Requirement Specification
Software
Specification
Operating System : Windows XP
Technology : JAVA
1.6
Database : SQL Server 2005
Minimum
Hardware Specification
Processor : Pentium
IV
RAM : 512 MB
Hard Disk : 80GB
No comments:
Post a Comment