Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.
dc.contributor.author | Shahzad, Muhammad Reg # 51237 | |
dc.contributor.author | Imran, Liza Reg # 41378 | |
dc.date.accessioned | 2023-11-28T06:04:47Z | |
dc.date.available | 2023-11-28T06:04:47Z | |
dc.date.issued | 2022 | |
dc.identifier.uri | http://hdl.handle.net/123456789/16598 | |
dc.description | Supervised by Dr. Imran Memon | en_US |
dc.description.abstract | The detection of Sybil attack is the main safe keeping and defence tasks in vehicular social network under IOT. This harmful attack is judged as one of the risky hazards since an attacker can create many false and fake identities. So, with fake messages to strictly damage the normal function of in vehicular social network (VANET) under IOT. This project will propose a unique Sybil attack detection method which is based on vehicularsocial network outline and the guidelines oftransmission power at the vehicle nodes. Our suitable application desktop /android can advantage to the very effective layer to vehicle nodes to adjust their communication authority and interaction to avoid more outbreaks and preserve great recognition and finding share. It would be give the desirous transparency and vitality intake. VANETs stand statement and transmission campaigns that attach automobiles and roadside Entities. Its use ofvehicle Network in circulation administration and peal management arrangements must improve freshly. It carry some retreat issues like VANETs, and unique ofsuch refuge matters are Sybil assaults, that belongs to a harm attack anywhere an artifice is fashioned by the specific knob actuality revealed as many knots to manipulate the elective in MANETs to hers benefit. Many approaches which is to be projected for Sybil assaults prevention also detection beneath the classifications ofRight-hand Endorsement, Supply Analysis, then Status confirmation. For respectively of these techniques below these classifications needs the area of perceiving and identification of Assaults and protective its discretion of kindly knots. Our application identifies the Sybil attack in which vehicles are communication and set up social network under the IOT environment | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Bahria University Karachi Campus | en_US |
dc.relation.ispartofseries | BS IT;MFN 44 | |
dc.title | SYBIL ATTACK DETECTION AND SECURE COMMUNICATION SCHEME BASED ON VEHICULAR SOCIAL NETWORK | en_US |
dc.type | Project Reports | en_US |