2021
DOI: 10.1109/access.2021.3049830
|View full text |Cite
|
Sign up to set email alerts
|

RTED-SD: A Real-Time Edge Detection Scheme for Sybil DDoS in the Internet of Vehicles

Abstract: Date of publication xxxx, date of current version xxxx.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 29 publications
0
11
0
Order By: Relevance
“…Vasudeva and Sood [68] discussed potential mechanisms to prevent fake node and Sybil attacks that include symmetric cryptography using a central authority, random key Pham et al [50] Strong authentication methods. Li et al [69] Entropy theory for predicting traffic distribution. Chang et al [70] Location-hidden authorized message generation scheme.…”
Section: Defenses Against Fake Node and Sybil Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Vasudeva and Sood [68] discussed potential mechanisms to prevent fake node and Sybil attacks that include symmetric cryptography using a central authority, random key Pham et al [50] Strong authentication methods. Li et al [69] Entropy theory for predicting traffic distribution. Chang et al [70] Location-hidden authorized message generation scheme.…”
Section: Defenses Against Fake Node and Sybil Attackmentioning
confidence: 99%
“…Pham et al [50] described strong authentication methods that can address impersonation or Sybil attacks preventing adversaries to send falsified information over the V2X communication channels to disrupt CAVs operation and traffic flow. Li et al [69] proposed a Real-Time Edge Detection Scheme for Sybil DDoS that used the entropy theory to quantify the traffic distribution and further designed an algorithm named Fast Quartile Deviation Check (FQDC) to recognize and locate the attack on the Internet of Vehicles (IoV). Footprint is a Sybil attack detection mechanism that used the trajectories of vehicles for identification without affecting the anonymity and location privacy of vehicles [70].…”
Section: Defenses Against Fake Node and Sybil Attackmentioning
confidence: 99%
“…Obfuscation of false information is performed using many fake identifiers issued by a single attacker in the form of a set of real nodes. e attacker, by this process, can control the IoV network challenging the security, efficiency, and consistency of the system [37]. (xviii) Fuzzy attack: the attacker focuses on studying a vehicle's behavior for a certain period to change its pattern.…”
Section: Possible Attacks On Iovmentioning
confidence: 99%
“…Deception is used for both defensive and offensive interactions. Researchers have developed various defences against offensive deception in connected vehicular networks such as Sybil attacks [33], false positioning attacks [34], illusion attacks [35] and topology poisoning attacks [36]. Honeypots have been widely implemented in network security for defensive deception [37], [38], moving target defence [39] and against advanced persistent threats [40].…”
Section: Related Workmentioning
confidence: 99%