2012
DOI: 10.1016/j.trc.2011.08.002
|View full text |Cite
|
Sign up to set email alerts
|

Hindering false event dissemination in VANETs with proof-of-work mechanisms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…Attacks on availability are especially dangerous for ITS due to the real-time operational requirements of many ITS components. Some of the existing solutions against denial-of-service attack include signature-based authentication [14] and proof-of-work [64] as shown in Table 3.…”
Section: Availabilitymentioning
confidence: 99%
“…Attacks on availability are especially dangerous for ITS due to the real-time operational requirements of many ITS components. Some of the existing solutions against denial-of-service attack include signature-based authentication [14] and proof-of-work [64] as shown in Table 3.…”
Section: Availabilitymentioning
confidence: 99%
“…This works because the computation becomes exponentially harder and cannot be precomputed. One proposal to use PoW mechanisms for cITS is [119], which requires PoW for evidence that an event actually occurred. The problem with these approaches is that they pose significant computational overhead, and thus cannot work in all situations.…”
Section: B Open Issuesmentioning
confidence: 99%
“…Most of the possible attacks in VANET are performed through manipulating context information [51,52]. In addition, attackers in VANET target this type of information as they can inflict major damage easily while they remain undetected [23,25,26,53]. As such, this study aims to build a mobility information-based MDS.…”
Section: Related Workmentioning
confidence: 99%