2022 5th International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT) 2022
DOI: 10.1109/impact55510.2022.10029103
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid framework to prevent VANET from Sybil Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…The model gave a good answer for both the different kinds of vehicles and the trust factor. The authors in [ 160 ] focused on identifying potential Sybil vehicles and protecting messages from Sybil attacks. The proposed strategy integrates metaheuristic methods during the establishment of communication to identify possible Sybil nodes and employs trust certification mechanisms to guarantee the integrity of messages.…”
Section: Solutions For Security and Trust In Iovmentioning
confidence: 99%
“…The model gave a good answer for both the different kinds of vehicles and the trust factor. The authors in [ 160 ] focused on identifying potential Sybil vehicles and protecting messages from Sybil attacks. The proposed strategy integrates metaheuristic methods during the establishment of communication to identify possible Sybil nodes and employs trust certification mechanisms to guarantee the integrity of messages.…”
Section: Solutions For Security and Trust In Iovmentioning
confidence: 99%
“…Compared with the overhead of direct identity detection mechanisms, indirect identity detection mechanisms are more lightweight, such as the detection methods based on vehicle cooperation [18,21,[34][35][36]. Panchal [37] proposed a method of separating Sybil attacks using adjacent information in VANETs.…”
Section: Indirect Identity Detection Mechanismsmentioning
confidence: 99%
“…In addition, the collusion [15] and separation behaviors between malicious and Sybil vehicles make malicious vehicles exhibit similar behavioral characteristics as normal vehicles. This is the main reason why many mitigation solutions against Sybil attacks can only detect Sybil vehicles but cannot accurately track malicious vehicles [16][17][18][19][20][21]. Notably, malicious vehicles are the source of Sybil attacks.…”
Section: Introductionmentioning
confidence: 99%