6th Joint IFIP Wireless and Mobile Networking Conference (WMNC) 2013
DOI: 10.1109/wmnc.2013.6549051
|View full text |Cite
|
Sign up to set email alerts
|

A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…When some malicious user enter into the network and stop forwarding messages to next nodes by dropping messages are called as black node [16].…”
Section: Black Hole Attackmentioning
confidence: 99%
“…When some malicious user enter into the network and stop forwarding messages to next nodes by dropping messages are called as black node [16].…”
Section: Black Hole Attackmentioning
confidence: 99%
“…Bayrem et al, [18] proposed a RFID based solution for detecting Sybil attack in VANETs. In this paper they assume that the network is divided into several zones, in each zone there are several RSUs and one of those RSU is selected as the controller of that zone called as road side controller (RSC).…”
Section: Related Workmentioning
confidence: 99%
“…Triki, Rekhis, Chammem and Boudriga [16] suggested RFID grounded Privacy Preserving strategy exerting two forms of validation methods. First method exerts RFID tags associated within vehicles for acquiring short span certificates from RSU after validation of vehicles along RFID tags by RSU.…”
Section: Related Workmentioning
confidence: 99%
“…WiFi IEEE 802.11p, WAVE IEEE 1609, WiMAX IEEE 802. 16, Bluetooth, IRA, Zig Bee, Satellites, DSRC (Dedicated Short Range Communications) are technologies exerted in VANET. Intelligent Transportation System (ITS) is composed of VANETs.…”
Section: Introductionmentioning
confidence: 99%