2013
DOI: 10.1002/sec.679
|View full text |Cite
|
Sign up to set email alerts
|

Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support

Abstract: Abstract-In this paper, we propose two certificate mechanisms for preventing the Sybil attack in a vehicular ad hoc network (VANET): the timestamp series approach and the temporary certificate approach. We focus on an early-stage VANET when the number of smart vehicles is only a small fraction of the vehicles on the road and the only infrastructure components available are the roadside units (RSUs). Unlike previously proposed schemes, which require a dedicated vehicular public key infrastructure to certify ind… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(22 citation statements)
references
References 27 publications
0
21
0
1
Order By: Relevance
“…In this section, we present a summary of various attacks on vehicular networks, which can be found in the literature [41][42][43][44][45][46][47][48][49][50][51][52][53]. Some of these attacks are performed by the member nodes already registered with the network and called insider attacks.…”
Section: Cyberattacks In Automotive Technologymentioning
confidence: 99%
See 2 more Smart Citations
“…In this section, we present a summary of various attacks on vehicular networks, which can be found in the literature [41][42][43][44][45][46][47][48][49][50][51][52][53]. Some of these attacks are performed by the member nodes already registered with the network and called insider attacks.…”
Section: Cyberattacks In Automotive Technologymentioning
confidence: 99%
“…The following are the common types of attacks which can be harmful to the security of vehicular network. (1) Sybil attack: In Sybil attack a node asserts itself as several nodes by simulating multiple identities [46,47]. An attacker sends several messages with multiple identities and announces its various positions at the same time.…”
Section: Cyberattacks In Automotive Technologymentioning
confidence: 99%
See 1 more Smart Citation
“…In urban VANET, there are fixed RSUs to provide extra service for vehicles. By receiving and saving the signatures which were broadcasted regularly by RSUs [17,29] or actively requesting RSUs signatures [18] (also named as timestamp series approach, TSA), vehicles obtain movement trajectories. In V2V communications, vehicle has to send information with its motion information.…”
Section: Related Workmentioning
confidence: 99%
“…Many methods are proposed, such as RSSI-based (Received Signal Strength Indicator) detection method [14][15][16], vehicle movement trajectory based method [17,18] and neighboring nodes information based method [19]. But there are two things that make the existing methods cannot work well: one is conspired Sybil attack, in which malicious vehicles obtain multiple false identities through the way of forgery, stolen and share their identities with the accomplices.…”
Section: Introductionmentioning
confidence: 99%