2023
DOI: 10.1016/j.adhoc.2023.103092
|View full text |Cite
|
Sign up to set email alerts
|

Detection method to eliminate Sybil attacks in Vehicular Ad-hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 4 publications
0
11
0
Order By: Relevance
“…In addition, since power affects RSSI, this scheme can only detect malicious vehicles without power control but cannot detect malicious vehicles with transmission power control [40]. Zhang [41] proposed a detection method based on Basic Safety Message (BSM) packets in 2023, which mainly detects the detected vehicle by receiving the receiver (Recv) of the BSM message broadcast by the detected vehicle. The Recv calculates the transmission distance (T d ) of the BSM message according to the sending time and receiving time information of the BSM message.…”
Section: Indirect Identity Detection Mechanismsmentioning
confidence: 99%
See 4 more Smart Citations
“…In addition, since power affects RSSI, this scheme can only detect malicious vehicles without power control but cannot detect malicious vehicles with transmission power control [40]. Zhang [41] proposed a detection method based on Basic Safety Message (BSM) packets in 2023, which mainly detects the detected vehicle by receiving the receiver (Recv) of the BSM message broadcast by the detected vehicle. The Recv calculates the transmission distance (T d ) of the BSM message according to the sending time and receiving time information of the BSM message.…”
Section: Indirect Identity Detection Mechanismsmentioning
confidence: 99%
“…In order to reduce the situation where normal vehicles cannot generally run due to detection errors, our goal is to increase the recall as much as possible while ensuring precision. Our comparative schemes are the Hunting scheme [17] and the Eliminate scheme [41]. The Hunting scheme [17] is chosen due to its graph-based detection mechanism.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 3 more Smart Citations