2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W) 2022
DOI: 10.1109/dsn-w54100.2022.00028
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Sybil Attack Detection Mechanisms in VFC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…This can result in stopping all communications with the node from which the attack comes, as far as the network is concerned it is the attacker. An example of an attack is a Sybil attack [14]. It is an attack on a computer network service by creating many pseudonymous identities using a single node within a peer-to-peer network.…”
Section: B Security Modulementioning
confidence: 99%
“…This can result in stopping all communications with the node from which the attack comes, as far as the network is concerned it is the attacker. An example of an attack is a Sybil attack [14]. It is an attack on a computer network service by creating many pseudonymous identities using a single node within a peer-to-peer network.…”
Section: B Security Modulementioning
confidence: 99%
“…In recent years, with the continuous development and application of blockchain technology, more and more researchers have begun to improve the PBFT algorithm and apply it to blockchain consensus. Inspired by the Proof of Stake (PoS) algorithm, Buchman [25] and others added empty blocks and lock mechanisms to simplify the PBFT consensus process, and assigned different weights to each vote to deal with Sybil attacks [26]. In order to improve the scalability of the PBFT consensus algorithm under the premise of ensuring security, Micali et al [27] proposed an efficient algorithm, using the encrypted lottery mechanism to elect verifiers and leaders, and then adopting the BA* protocol to reach new blocks the consensus is generated in rounds.…”
Section: Blockchain-based Trust Managementmentioning
confidence: 99%
“…Notably, malicious vehicles are the source of Sybil attacks. Yang et al organized Sybil attacks regarding the traceability of malicious vehicles [22], pointing out that existing schemes have apparent drawbacks for the traceability of malicious vehicles. This allows malicious vehicles to continue to exist in the vehicular network and continue Sybil attacks.…”
Section: Introductionmentioning
confidence: 99%