2019
DOI: 10.1109/tmc.2018.2833849
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using RSSI

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
44
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 88 publications
(44 citation statements)
references
References 22 publications
0
44
0
Order By: Relevance
“…For this reason, the literature specifies an important limitation compared to the Dolev-Yao model: an attacker must be a node in the network, restricted by the same physical properties that restrict a normal node. Although their transmission range may be increased through power control [57], attackers are considered to have a limited physical presence [39]. In addition, it is commonly assumed that attackers are constrained to physical limitations such as the speed of light.…”
Section: A Definition and Attacker Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…For this reason, the literature specifies an important limitation compared to the Dolev-Yao model: an attacker must be a node in the network, restricted by the same physical properties that restrict a normal node. Although their transmission range may be increased through power control [57], attackers are considered to have a limited physical presence [39]. In addition, it is commonly assumed that attackers are constrained to physical limitations such as the speed of light.…”
Section: A Definition and Attacker Modelmentioning
confidence: 99%
“…This will be especially challenging when combined with newly proposed MAC-protocols that exploit the additional spatial re-use enabled by transmit power variations, such as decentralized congestion control in ETSI [118]. Although some proposals [57] address this issue by looking at signals over time, this increases the detection latency.…”
Section: A Reoccurring Patternsmentioning
confidence: 99%
“…Prior work [75], [93] also do not account for GPS errors in the model. A distributed mechanism, Voiceprint [94], was proposed to detect Sybil attacks by analyzing RSSI (received signal strength indicator)-based measurements (e.g., by performing a similarity measures between the RSSI of an attacker and its Sybil nodes over time). However Voiceprint may not detect attacks if an adversary uses more than one radio.…”
Section: B Detecting Sybil Attacksmentioning
confidence: 99%
“…The proposed model performs the load balancing among the nodes with limited buffer space. However, none of these papers has considered security requirements IoT devices are list as follows: In [16], the authors have proposed a Sybil attack detection mechanism based on the count interval and affinity value of the observer and Sybil node. The affinity value was calculated using a graph.…”
Section: Related Workmentioning
confidence: 99%