On the Sybil attack detection in VANET
Citations
308 citations
Cites methods from "On the Sybil attack detection in VA..."
...Without the global social graph for Sybil detection, MSD aims to either detect SA-3 or restrict Sybil attacker’s behaviors....
[...]
269 citations
Cites background from "On the Sybil attack detection in VA..."
...A study on the effectiveness of using signal strength distribution to detect the attack is given in [31], and [32] shows that the type of antenna in use has a remarkable effect on detection....
[...]
238 citations
197 citations
Cites background from "On the Sybil attack detection in VA..."
...Position-related attacks include location falsification and sybil attack [43]....
[...]
...For sybil attack, reference [43] found that the...
[...]
188 citations
References
[...]
4,816 citations
"On the Sybil attack detection in VA..." refers background or methods in this paper
...1) The Sybil attack: The Sybil attack was first described and formalized by Douceur in [4]....
[...]
...The method described in [4] uses computational puzzles [7] to test nodes computational resources....
[...]
...2) Resources testing: [4] and [8] propose resources testing as a defense against Sybil attack....
[...]
...The multiplication of fake nodes in a wireless network in order to launch different kind of attack is known as the Sybil attack [4]....
[...]
...One important result shown in [4] is that without a logically centralized authority, Sybil attacks are always possible (i....
[...]
1,550 citations
1,402 citations
1,104 citations
817 citations
"On the Sybil attack detection in VA..." refers methods in this paper
...In [3], the authors present a novel approach called verifiable multilateration, using distance bounding protocol [ 2 ] and base stations to provide secure positioning....
[...]