2019
DOI: 10.1109/jiot.2019.2933632
|View full text |Cite
|
Sign up to set email alerts
|

Securing Traffic-Related Messages Exchange Against Inside-and-Outside Collusive Attack in Vehicular Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…In this way, the effectiveness of each technique in the AGTM and the robustness of the overall model can be verified. Finally, we selected the following three comparison models: the equal‐weight trust model (EWTM) [16], the feedback model based on the target information entropy theory (FMOIE) [17], and the trust value fluctuation analysis model (TFAM) [18]. They have been proposed and cited in the existing literature, and all belong to lightweight models.…”
Section: Simulation Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…In this way, the effectiveness of each technique in the AGTM and the robustness of the overall model can be verified. Finally, we selected the following three comparison models: the equal‐weight trust model (EWTM) [16], the feedback model based on the target information entropy theory (FMOIE) [17], and the trust value fluctuation analysis model (TFAM) [18]. They have been proposed and cited in the existing literature, and all belong to lightweight models.…”
Section: Simulation Analysismentioning
confidence: 99%
“…Yuan et al adopt an information fusion algorithm based on objective information entropy theory, which can overcome the limitations of traditional trust schemes, whereby the trust factors are weighed manually or subjectively [17]. Feng et al established weights based on the volatility of the nodes' trust values and improved the real-time performance to detect malicious attacks [18]. There are also studies on the improvement of trust models based on complex algorithms.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, most spatial cloaking schemes assume that CVs always tell the truth, and fail to consider location cheating behaviors during the construction of the cloaking area. The high mobility and volatility characteristics of VANETs make adjacent vehicles usually unknown to each other [11]. This may offer opportunities for dishonest CVs to provide false location information, which leads that the cloaking area cannot satisfy the privacy protection requirement of RV.…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, as collectors, vehicles can integrate and analyze received information, so as to avoid congested road and prevent accidents. However, due to the wireless network communication environment, it's easy for attackers to intercept, tamper and replay the transmitted messages, which gives a risk to security and reliability of VANETs [3]. According to [4], authentication is considered to be the most reliable mechanism to ensure the legitimacy of entities in VANETs.…”
Section: Introductionmentioning
confidence: 99%