[2] facilitate vehicles to communicate each other in also with the support of infrastructure. The span of VANET is too short as the network topology is dynamic in nature. The nodes in the VANET move in and out of the network frequently, as it has a greater dynamic mobility pattern. Moreover, the density of the network keeps on varying with respect to the traffic condition. The major parts of vehicular ad hoc networks are vehicles (entity or node), RSU, the Location Server (LS) and Trusted Certification Authority (TCA). The dynamic nature of VANET makes it more vulnerable to attacks and has several security issues. A privacy location of the vehicle user is much important as the data sent by a vehicle may have important consequences like accident prevention. The exact location of the vehicles is traced using advanced techniques in localization and tracking. Thus, it is possible to gain information about the past history of the vehicle it has visited. This information can be further used in an illegal manner by a stranger. Moreover, private information or details of the user can be gathered by identifying the LBS services used by a vehicle. There are two approaches in VANET. One is vehicle-to-vehicle (V2V) interaction, and the other is vehicle-to-infrastructure (V2I) interaction. In V2V interaction, there is no need for fixed infrastructure or any RSUs, and it is purely ad hoc in nature. In V2V, a vehicle interacts only with another vehicle to estimate the traffic condition. On the other hand, in the case of V2I interactions, interactions are held between a vehicle and a fixed infrastructure like RSUs. This kind of infrastructure provides aggregation and key distribution to the vehicles. The major issue to be considered in this architecture is the number of required RSUs cannot be predicted. VANET has several security issues such as location privacy, traceability, availability, integrity, confidentiality, and authentication, non-repudiation, and non-frame ability. An efficiency of any system that provides a solution to above problems can be estimated using storage, efficiency in communication and computation efficiency [3]. In urban vehicular networks, location privacy preservation is very challenging. A malicious attacker can pretend to be multiple vehicles and disseminate false data in the network named as Sybil attack. Sybil attack is a significant concern as it impairs the performance of VANET. In Sybil attack, the attacker can design multiple identities, and it sends the identities to the other nodes to corroborate false data. It is simple to launch other attacks in the network at the presence of Sybil attack. The previous approaches