DOI:10.20894/IJCNES.
Periodicity: Bi Annual.
Impact Factor:
SJIF:5.217
Submission:Any Time
Publisher:IIR Groups
Language:English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJCNES provides online manuscript tracking system.

Every issue of Journal of IJCNES is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCNES special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJCNES website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 1 Issue 2 Date of Publication:   December 2012

Privacy Preservation of Rsu Against Sybil Attacks in Vanet

S. Preetha,K. Prakash

Page(s):   63-66 ISSN:   2278-2397
DOI:   10.20894/IJCNES.103.001.002.004 Publisher:   Integrated Intelligent Research (IIR)


  1. Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su,   "An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Commu",   IEEE Trans. Vehicular Technology   ,Vol.59   ,2010
    View Artical

  2. R. Lu, X. Lin, H. Zhu, and X. Shen,   "An Intelligent Secure and Privacy-Preserving Parking Scheme through Vehicular Communications",   IEEE Trans. Vehicular Technology   ,2010
    View Artical

  3. J.R. Douceur,   "The Sybil Attack",   Proc. First Int?l Workshop Peer-to-Peer Systems   ,2002
    View Artical

  4. J. Eriksson, H. Balakrishnan, and S. Madden,   "Cabernet: Vehicular Content Delivery Using WiFi   ,2008
    View Artical

  5. M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D.S.Wallach,   "Secure Routing for Structured Peer-to-Peer Overlay Networks",   Symp. Operating Systems Design and Implementation   ,2002
    View Artical

  6. S.Chang, Y.Qi, H.Zhu, J.Zhao, and X.Shen,   "Footprint: Detecting Sybil Attacks in Urban Vehicular Networks",   IEEE Trans. Parallel and Distributed Systems   ,Vol.23   ,2012
    View Artical

  7. J. Newsome, E. Shi, D. Song, and A. Perrig,,   "The Sybil Attack in Sensor Networks: Analysis & Defenses",   Proc. Int?l Symp. Information Processing in Sensor   ,2004
    View Artical

  8. S. Capkun, L. Buttya_n, and J. Hubaux,   "Self-Organized Public Key Management for Mobile Ad Hoc Networks",   IEEE Trans. Mobile Computing   ,Vol.2   ,2003
    View Artical

  9. C. Piro, C. Shields, and B.N. Levine,   "Detecting the Sybil Attack in Mobile Ad Hoc Networks",   Proc. Securecomm and Workshop   ,2006
    View Artical

  10. N. Borisov,   "Computational Puzzles as Sybil Defenses",   Proc. Sixth IEEE Int?l Conf. Peer-to-Peer Computin   ,2006
    View Artical

  11. P. Maniatis, D.S.H. Rosenthal, M. Roussopoulos, M. Baker, T.Giuli, and Y. Muliadi,   "Preserving Peer Replicas by Rate-Limited Sampled Voting",   19th ACM Symp. Operating Systems Principles   ,2003
    View Artical

  12. H. Yu, M. Kaminsky, P.B. Gibbons, and A. Flaxman,   "Sybilguard:Defending against Sybil Attacks via Social Networks   ,2006
    View Artical

  13. M.S. Bouassida, G. Guette, M. Shawky, and B. Ducourthial,   "Sybil Nodes Detection Based on Received Signal Strength Variations within Vanet   ,Vol.9   ,2009
    View Artical

  14. B. Xiao, B. Yu, and C. Gao,   "Detection and Localization of Sybil Nodes in Vanets",   Workshop Dependability Issues in Wireless Ad Hoc N   ,2006
    View Artical

  15. T. Zhou, R.R. Choudhury, P. Ning, and K. Chakrabarty,   "Privacy Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks",   Proc. Fourth Ann. Int?l Conf. Mobile and Ubiquitou   ,2007
    View Artical

  16. Q. Wu, J. Domingo-Ferrer, and U. Gon_zalez-Nicola? s,   "Balanced Trustworthiness, Safety and Privacy in Vehicle-to-vehicle Communications",   IEEE Trans. Vehicular Technology   ,Vol.59   ,2010
    View Artical

  17. L. Chen, S.-L. Ng, and G. Wang,   "Threshold Anonymous Announcement in VANETs",   IEEE J. Selected Areas in Comm   ,Vol.29   ,2011
    View Artical

  18. C. Chen, X. Wang, W. Han, and B. Zang,   "A Robust Detection of the Sybil Attack in Urban Vanets",   IEEE Int?l Conf. Distributed Computing Systems Wor
    View Artical

  19. S. Park, B. Aslam, D. Turgut, and C.C. Zou,,   "Defense against Sybil Attack in Vehicular Ad Hoc Network Based on Roadside Unit Support   ,2009
    View Artical

  20. J.K. Liu, V.K. Wei, and D.S. Wong,   "Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract)",   Australasian Conf. Information Security and Privac   ,2004
    View Artical

  21. Y. Dodis, A. Kiayias, A. Nicolosi, and V. Shoup,   "Anonymous Identification in Ad Hoc Groups",   Proc. Int?l Conf. Theory and Applications of Crypt   ,2004
    View Artical

  22. P.P. Tsang and V.K. Wei,,   "Short Linkable Ring Signatures for EVoting,E-Cash and Attestation",   Proc. Information Security Practice and Experience   ,2005
    View Artical

  23. P.P. Tsang, V.K. Wei, T.K. Chan, M.H. Au, J.K. Liu, and D.S.Wong,   "Separable Linkable Threshold Ring Signatures   ,2004
    View Artical

  24. P.R. O ? stergard,   "A Fast Algorithm for the Maximum Clique Problem   ,Issue 120   ,2002
    View Artical