2019 IEEE 10th Annual Ubiquitous Computing, Electronics &Amp; Mobile Communication Conference (UEMCON) 2019
DOI: 10.1109/uemcon47517.2019.8993045
|View full text |Cite
|
Sign up to set email alerts
|

A Misbehavior Authority System for Sybil Attack Detection in C-ITS

Abstract: Global misbehavior detection is an important backend mechanism in Cooperative Intelligent Transport Systems (C-ITS). It is based on the local misbehavior detection information sent by Vehicle's On-Board Units (OBUs) and by RoadSide Units (RSUs) called Misbehavior Reports (MBRs) to the Misbehavior Authority (MA). By analyzing these reports, the MA provides more accurate and robust misbehavior detection results. Sybil attacks pose a significant threat to the C-ITS systems. Their detection and identification may … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 32 publications
(18 citation statements)
references
References 11 publications
0
17
0
Order By: Relevance
“…Hardware/Software-based Attacks Several attacks can take place over the hardware components and software sys- Platoon Attack [37] DDoS Attack [38] DDoS Attack [74] DDoS Attack [77] DDoS Attack [39] GreyHole & BlackHole [40] Black hole [41] Sybil Attack [42] Sybil Attack [43] Sybil Attack [44] Jamming Attack [69] Jamming Attack [45] jamming Attack [91] Data Manipulation [70] Crossfire Attack [56] Spoofing Attack [57] Spoofing Attack [58] Spoofing Attack [92] Cyber Physical Attack [93] Cyber Physical Attack [46] MDS [47] MDS [49] MDS [50] MDS [82] MDS [68] MDS [76] MDS [55] MDS [48] FDI [51] IDS [52] IDS [59] IDS [60] IDS [53] IDS [54] IDS [81] IDS [73] IDS [94] IDS [95] Trust Computation [96] Trust Computation [61] Trust Computation [62] Trust Computation [63] Trust Computation [71] Trust Computation [65] Trust Computation [66] Trust Com...…”
Section: Security Attacks and Requirementsmentioning
confidence: 99%
See 3 more Smart Citations
“…Hardware/Software-based Attacks Several attacks can take place over the hardware components and software sys- Platoon Attack [37] DDoS Attack [38] DDoS Attack [74] DDoS Attack [77] DDoS Attack [39] GreyHole & BlackHole [40] Black hole [41] Sybil Attack [42] Sybil Attack [43] Sybil Attack [44] Jamming Attack [69] Jamming Attack [45] jamming Attack [91] Data Manipulation [70] Crossfire Attack [56] Spoofing Attack [57] Spoofing Attack [58] Spoofing Attack [92] Cyber Physical Attack [93] Cyber Physical Attack [46] MDS [47] MDS [49] MDS [50] MDS [82] MDS [68] MDS [76] MDS [55] MDS [48] FDI [51] IDS [52] IDS [59] IDS [60] IDS [53] IDS [54] IDS [81] IDS [73] IDS [94] IDS [95] Trust Computation [96] Trust Computation [61] Trust Computation [62] Trust Computation [63] Trust Computation [71] Trust Computation [65] Trust Computation [66] Trust Com...…”
Section: Security Attacks and Requirementsmentioning
confidence: 99%
“…Confidentiality [53] Availability [37]- [40], [44], [45], [49]- [55], [59], [60], [69], [70], [74], [77], [81], [84], [94], [98] Integrity [36], [46], [48], [52], [68], [76], [82], [91]- [93] Privacy [42], [51], [54], [64], [72], [75], [78], [80] Authentication [41]- [43], [46], [49], [53], [55]- [60] Trust [61]- [63], [65]- [67], [71], [79], [95], [96] This survey centers around the use of ML in achieving the above security requirements. As shown in Fig.…”
Section: Security Attacks and Requirementsmentioning
confidence: 99%
See 2 more Smart Citations
“…Here, we briefly summarize the general purpose of the implemented checks. In contrast, a more detailed and technical description could be found in our previous studies [9] [3]. Additionally, the implementation is open source and could be found on GitHub [10].…”
Section: Local Detectionmentioning
confidence: 99%