2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI) 2021
DOI: 10.1109/icrami52622.2021.9585965
|View full text |Cite
|
Sign up to set email alerts
|

The Impact of Sybil Attacks on Vehicular Fog Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…The location information in the vehicular network must be validated using different devices such as radar, GPS, etc. The algorithm eliminates the improbable spots if the vehicles do not have such equipment [84]. The tamper-proof GPS device is one of the most effective solutions for safeguarding vehicle position.…”
Section: F Attacks In Vfcmentioning
confidence: 99%
“…The location information in the vehicular network must be validated using different devices such as radar, GPS, etc. The algorithm eliminates the improbable spots if the vehicles do not have such equipment [84]. The tamper-proof GPS device is one of the most effective solutions for safeguarding vehicle position.…”
Section: F Attacks In Vfcmentioning
confidence: 99%
“…The following attacks can track a vehicle’s broadcast messages. The Sybil attack [ 59 ] undermines the system by creating many fictitious nodes, while spoofing [ 60 ] manipulates communication by impersonating another device. MiTM attacks [ 56 ] secretly relay and possibly alter the communication between two parties who believe they are directly communicating with each other.…”
Section: Vehicular Network: Backgroundmentioning
confidence: 99%
“…In order to deal with the potential threat of Sybil attacks in CAV networks, we must conduct more in-depth research on attack detection and countermeasure strategies. Benadla et al have provided a brief description of the impact of Sybil attacks on vehicular networks and a detailed categorization of Sybil attack detection methods in VANETs [13]. These studies provide valuable references but still need to be further explored in depth in order to establish a more complete and effective defense mechanism.…”
Section: Introductionmentioning
confidence: 99%