2016
DOI: 10.17485/ijst/2016/v9i48/99870
|View full text |Cite
|
Sign up to set email alerts
|

Resilient Privacy Preservation Scheme to Detect Sybil Attacks in Vehicular Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…To preserve the location privacy of vehicles, the work in [22] proposes an anonymous beacon generation mechanism. To provide high authentication messages by detecting the Sybil attack and compromised RSU, the work in [23] proposes an efficient authentication scheme and a secret maintenance mechanism. To detect Sybil attacker attack and a compromised RSU, the work in [24] supports a temporarily authorized certificate that includes the trusted certificate and secret key trajectories to the vehicles for communication.…”
Section: ©Ijraset: All Rights Are Reservedmentioning
confidence: 99%
“…To preserve the location privacy of vehicles, the work in [22] proposes an anonymous beacon generation mechanism. To provide high authentication messages by detecting the Sybil attack and compromised RSU, the work in [23] proposes an efficient authentication scheme and a secret maintenance mechanism. To detect Sybil attacker attack and a compromised RSU, the work in [24] supports a temporarily authorized certificate that includes the trusted certificate and secret key trajectories to the vehicles for communication.…”
Section: ©Ijraset: All Rights Are Reservedmentioning
confidence: 99%