2012 9th International ISC Conference on Information Security and Cryptology 2012
DOI: 10.1109/iscisc.2012.6408215
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Sybil attacker behavior in VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Beacons and Context Awareness Messages (CAMs) are the mechanism by which a vehicle node in a VANET routinely communicates with its neighbors in order to provide the latter with information regarding the location of the vehicles that are located in close proximity to it. CAMs are often provided (in broadcast) at a rate of one per hundred millisecond via a single-hop connection that can span a distance of at least one kilometer [19]. The contents of the communications include not only the identities of the nodes, but also their positions, times, speeds, and accelerations, in addition to information regarding mobility and context.…”
Section: A Movement Matrix Definedmentioning
confidence: 99%
“…Beacons and Context Awareness Messages (CAMs) are the mechanism by which a vehicle node in a VANET routinely communicates with its neighbors in order to provide the latter with information regarding the location of the vehicles that are located in close proximity to it. CAMs are often provided (in broadcast) at a rate of one per hundred millisecond via a single-hop connection that can span a distance of at least one kilometer [19]. The contents of the communications include not only the identities of the nodes, but also their positions, times, speeds, and accelerations, in addition to information regarding mobility and context.…”
Section: A Movement Matrix Definedmentioning
confidence: 99%
“…Consequently, in our insight, this paper shows the worth examination since it demonstrates the execution time of MVQQ algorithm in different scenarios of VANET. [6] The objective was to accomplish nearby security by utilizing locally available radar to recognize neighbors and to affirm their declared GPS organizes. Every vehicle produces data about the condition of the movement dependent on both what is seen and what is received from different vehicles in the framework.…”
Section: Interconnected Workmentioning
confidence: 99%
“…In a Sybil assault the aggressor subverts the notoriety arrangement of a distributed system by making a substantial number of pseudonymous personalities, utilizing them to pick up an excessively huge impact [18]. …”
Section: Sybil Attackmentioning
confidence: 99%