2022
DOI: 10.1109/tits.2022.3165513
|View full text |Cite
|
Sign up to set email alerts
|

Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 67 publications
0
2
0
Order By: Relevance
“…Meanwhile, their scheme fails to resist the infamous Sybil attack and merely supports the simple average of feedback score ciphertexts. However, the Sybil attack will greatly disturb the normal operations in a reputation management system [29], [30], and as revealed in many recent researches [5], [14], [31], the simple average will provide obviously weaker robustness against malicious feedback providers than the weighted average, in which the reputation values of feedback providers are adopted as important weights.…”
Section: Related Workmentioning
confidence: 99%
“…Meanwhile, their scheme fails to resist the infamous Sybil attack and merely supports the simple average of feedback score ciphertexts. However, the Sybil attack will greatly disturb the normal operations in a reputation management system [29], [30], and as revealed in many recent researches [5], [14], [31], the simple average will provide obviously weaker robustness against malicious feedback providers than the weighted average, in which the reputation values of feedback providers are adopted as important weights.…”
Section: Related Workmentioning
confidence: 99%
“…With this majority, they can influence the validation process of new blocks, cancel transactions by creating longer branches of the chain, or double-spend by confirming a transaction on the main chain and then canceling it on a chain they continue to develop in secret [33]. Sybil attack: it focuses on the creation of a large number of false identities by a single attacker in a decentralized network [34]. The attacker uses these identities to gain disproportionate influence over the network by potentially affecting consensus or reputation mechanisms such as manipulating votes for protocol changes, or engaging in behavior that degrades network trust and security, like fraudulently confirming invalid transactions or blocks [35].…”
Section: Overview Of Security Concerns Associated With Blockchain Tec...mentioning
confidence: 99%
“…Recent surveys on Sybil attack detection in wireless ad hoc networks and wireless sensor networks can be found in Arshad et al [12], Vasudeva and Sood [18], and Singh [19]. There are also several recent survey papers on Sybil attack detection in VANETs, including Shobana and Arockia [20], Zhang et al [21], Velayudhan and Anitha [22], and Hammi et al [23].…”
Section: B Sybil Attack Detection In Ioftmentioning
confidence: 99%
“…Furthermore, the ways in which some of these schemes operate impose various other undesirable constraints. For example, schemes such as Kabbur and Kumar [24] and Yuan et al [25] use RSS indication values obtained through triangulation, requiring at least three monitoring nodes to be used [12] [23]. Other examples include schemes like Lv et al [26], Abbas et al [27] and Angappan et al [28], which require the use of additional localization information such as those obtainable through neighbors of the suspicious nodes [12]; consequently, unlike schemes that purely and directly use intrinsically generated physical layer data, these schemes may be more susceptible to attacks involving information spoofing.…”
Section: B Sybil Attack Detection In Ioftmentioning
confidence: 99%