2016
DOI: 10.1007/s12083-016-0431-x
|View full text |Cite
|
Sign up to set email alerts
|

A method for defensing against multi-source Sybil attacks in VANET

Abstract: Sybil attack can counterfeit traffic scenario by sending false messages with multiple identities, which often causes traffic jams and even leads to vehicular accidents in vehicular ad hoc network (VANET). It is very difficult to be defended and detected, especially when it is launched by some conspired attackers using their legitimate identities. In this paper, we propose an event based reputation system (EBRS), in which dynamic reputation and trusted value for each event are employed to suppress the spread of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
48
0
2

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 74 publications
(50 citation statements)
references
References 29 publications
0
48
0
2
Order By: Relevance
“…It can present many well developed low layer protocol with easy programming interfaces. [6]. NS2 is used with configured area 1000 X 1000 m. Some node act as RSU and some node act as vehicles.…”
Section: Results and Simulationmentioning
confidence: 99%
See 2 more Smart Citations
“…It can present many well developed low layer protocol with easy programming interfaces. [6]. NS2 is used with configured area 1000 X 1000 m. Some node act as RSU and some node act as vehicles.…”
Section: Results and Simulationmentioning
confidence: 99%
“…Back to back approved message acquire by mysterious vehicle from RSU frame a direction to character comparing vehicle. Xin [15] proposed an occasion based notoriety strategy in which every vehicle has one of a kind notoriety est eem and one of a kind trust esteem, Unique ID, mystery key and hash work. At the point when the updating of notoriety and limit esteem inform the driver through UI(User Interface) in OBU.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the former case, the attacker uses the identity group to launch different types of attacks where the number of identities plays an important role, in some ways, to counteract a working system, such as Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks or altering the outcome of voting-based protocol(s). In the latter case, the identities may be used to escape accountability and/or traceability, such as evading a detection system where after the detection of one identity another forged identity emerges [8], thereby whitewashing all the malicious actions committed. The Sybil attacker may either adopt arbitrary identifiers for his Sybil, virtual identities or spoof the already existing nodes' identities.…”
Section: Introductionmentioning
confidence: 99%
“…The simulation results show that, with a proper reputation remodelling components and applicable threshold backdrop, our proposed system can expertly defend against falsify messages disseminate on various VANET environments. Xia Feng1 et.al [16] Sybil attack can counterfeit traffic rundown by dispatching casuistic messages with numerous coherences, which usually doer traffic corners and even bulges to vehicular collisions in vehicular ad hoc network (VANET). It is very extensive to be fortified and encountered, eminently when it is lofted by some contrived assaulters using their canonical selfdom.…”
Section: Introduction Vehicular Ad-hoc Network (Vanets)mentioning
confidence: 99%