| 000 | 06128nam a22002537a 4500 | ||
|---|---|---|---|
| 008 | 210117b2019 a|||f mb|| 00| 0 eng d | ||
| 040 |
_aEG-CaNU _cEG-CaNU |
||
| 041 | 0 |
_aeng _beng |
|
| 082 | _a658 | ||
| 100 | 0 | _aMohamed Khalil | |
| 245 | 1 |
_aCryptographic Scheme For Sybil Attacks Prevention In Vehicular Ad-Hoc Networks / _cMohamed Khalil |
|
| 260 | _c2019 | ||
| 300 |
_a 62 p. _bill. _c21 cm. |
||
| 500 | _3Supervisor: Marianne Azer | ||
| 502 | _aThesis (M.A.)—Nile University, Egypt, 2019 . | ||
| 504 | _a"Includes bibliographical references" | ||
| 505 | 0 | _aContents: Chapter I INTRODUCTION ……………………………………………….…………………………………….……..9 1.1 General Overview………………………………………….…………………………………..….…….10 1.2 Aims and Objectives …………...........................................................................10 1.3 Research Goals …………………………………………………………..…………………………..….11 1.4 Research Objective ………………………………………...............................................11 1.5 Thesis Organization ……………………………………...................................................11 CHAPTER II VANETS BACKGROUND ……………………………………………..……………………………...12 2.1 Definition ………………………………………………………………………………………………..….12 2.2 VANETs’ History ………………………………………………………………………………………….13 2.3 Main characteristics of VANETs ……………………………………………………………………...13 2.4 VANETs’ Operation …………………………………………………………………….…………………14 2.5 Routing in VANETs …………………….…………………………………………………………….…..15 2.6 Ad hoc Network Challenges …………………………………………………………………………….18 2.7 Network Security Vulnerabilities ………………………………………………………………………19 2.8 Security Requirements …………………………………………………………………….……….……20 2.9 VANETs’ Applications ………………………………………………………………………………..…21 3.10 Attacks on VANETS …………………………………………………….……………………………….26 2.11 Types of Attackers ……………………………………………………………………………………..…29 2.12 Summary ………………………………………………………………………………………………….…29 4 CHAPTER III CRYPTOGRAPHIC SCHEME FOR SYBIL ATTACKS PREVENTION IN VANETS [CRYPTO-SAP] …………………………………………………………………………..….30 3.1 Problem Definition ……………………………………………………….………………………………….30 3.2 Ways to Detect Sybil Attacks ……………………….…………………………………………………….31 3.3 Basic Assumptions …………………………………….………..……….………………………………….33 3.4 Proposed Scheme …………………………………………….………………….……………………………34 3.5 Summary ………………………………………………………………..…………….………………………..38 CHAPTER IV SIMULATIONS AND RESULTS ………………………………………………………………………39 4.1 Proposed Simulation Methodology and setup …………………………………………………..…….39 4.2 Simulation results ………………………………………………………………………..……………………40 4.3 Proposed Scheme Advantages ………………………………..………………..………………………… 51 4.4 Summary ……………………………………………………………………..……………………………..….51 CHAPTER V CONCLUSIONS AND FUTURE WORK ……………….………………………………………. | |
| 520 | 3 | _aAbstract: Mobile Ad Hoc Networks (MANETs) consist of self-organized nodes which can operate as hosts or routers inside the network. This allows seamless internetworking between nodes without any pre-configured network infrastructure or centralized model of administration. MANETs have become one of the most dominant areas of research because of the importance of such networks and the challenges facing their operation. Vehicular Ad-hoc Networks (VANETs) are a special type of MANETs. VANETs are deployed to introduce the ability of inter-communication among vehicles in order to guarantee safety and provide services for people while driving. Due to the security vulnerabilities in VANETs, an attacker can access the communication media, VANETs are exposed to many types of attacks. Denial of service, spoofing, ID disclosure and Sybil attacks can be launched against VANETs. In this thesis, we propose a novel lightweight approach for preventing Sybil attacks in VANETs called Cryptographic scheme for Sybil Attack Prevention [Crypto-SAP]. The proposed protocol scheme [Crypto-SAP] uses symmetric key encryption and authentication between Road Side Units (RSUs) and vehicles on the road so that no malicious vehicles could gain more than one identity inside the network. Simulations were used to investigate the effect of using Crypto-SAP on the network performance. | |
| 546 | _aText in English, abstracts in English. | ||
| 650 | 4 |
_aInformation Security _9294 |
|
| 655 | 7 |
_2NULIB _aDissertation, Academic _9187 |
|
| 690 |
_aInformation Security _9294 |
||
| 942 |
_2ddc _cTH |
||
| 999 |
_c8851 _d8851 |
||