Proceedings of the Seventh ACM International Workshop on VehiculAr InterNETworking 2010
DOI: 10.1145/1860058.1860067
|View full text |Cite
|
Sign up to set email alerts
|

VANET alert endorsement using multi-source filters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 50 publications
(30 citation statements)
references
References 9 publications
0
29
0
Order By: Relevance
“…However, this scheme creates more computation and delay due to six sources for false PCN or congestion event detection. In some scenarios, a threshold may not be crossed due to VANETs' characteristics only to analyse or to endorse the EEBL applications, and no further applications has been tested or evaluated [67].…”
Section: Consistency-based Detectionmentioning
confidence: 99%
“…However, this scheme creates more computation and delay due to six sources for false PCN or congestion event detection. In some scenarios, a threshold may not be crossed due to VANETs' characteristics only to analyse or to endorse the EEBL applications, and no further applications has been tested or evaluated [67].…”
Section: Consistency-based Detectionmentioning
confidence: 99%
“…Furthermore, in the case where the adversary is a trusted insider such as a compromised vehicle with a valid certificate, the problem is much harder to solve. Typical approaches to handling this issue is via misbehavior/anomaly detection techniques such as [7] which require multiple sources of data which may not always be available. In addition, such techniques do not guarantee perfect detection in all circumstances and are usually associated with finite false negative and false positive rates.…”
Section: A Application Layer Attacksmentioning
confidence: 99%
“…In [8], Tiffany Hyun-Jin, et al proposed a model to distinguish spurious messages from legitimate messages. They explore six different sources of information to enable vehicles to filter malicious messages that are transmitted by a minority of disobedient vehicles.…”
Section: B Proposed Solutionsmentioning
confidence: 99%