2018 IEEE 88th Vehicular Technology Conference (VTC-Fall) 2018
DOI: 10.1109/vtcfall.2018.8690701
|View full text |Cite
|
Sign up to set email alerts
|

Attacker Placement for Detecting Vulnerabilities of Pseudonym Change Strategies in VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…In this article, we have compared and analyzed the effectiveness of the existing pseudonym changing schemes and evaluated their performance using the following two widely accepted performance metrics 10 , 11 : tracking success rate (TSR) and entropy of anonymity set size …”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this article, we have compared and analyzed the effectiveness of the existing pseudonym changing schemes and evaluated their performance using the following two widely accepted performance metrics 10 , 11 : tracking success rate (TSR) and entropy of anonymity set size …”
Section: Introductionmentioning
confidence: 99%
“…The attackers can take advantage by having the information of PCS used by the vehicles. This knowledge benefits the attacker in the placement of the equipment 11 , 19 . If all the vehicles are following the same scheme in all the scenarios, various factors like traffic congestion, fixed time interval for the change, and intersection mix zones help the attacker to decide the most suitable location for placement for maximum coverage.…”
Section: Introductionmentioning
confidence: 99%