2017 IEEE Wireless Communications and Networking Conference (WCNC) 2017
DOI: 10.1109/wcnc.2017.7925783
|View full text |Cite
|
Sign up to set email alerts
|

Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
26
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 47 publications
(26 citation statements)
references
References 21 publications
0
26
0
Order By: Relevance
“…On the other hand, ROPE protocol [13] will be able to improve the drawbacks realised in SeR-Loc protocol though it increases the cost of the system with increase in hardware requirement. Similarly, SeR-Loc protocol demonstrates requirements like identification of the deployment density of the nodes which are not apt for securing the system against attacks [14].…”
Section: Hirloc Protocol Faces the Issue Of Computing Complexity And High Communication Overheadmentioning
confidence: 99%
“…On the other hand, ROPE protocol [13] will be able to improve the drawbacks realised in SeR-Loc protocol though it increases the cost of the system with increase in hardware requirement. Similarly, SeR-Loc protocol demonstrates requirements like identification of the deployment density of the nodes which are not apt for securing the system against attacks [14].…”
Section: Hirloc Protocol Faces the Issue Of Computing Complexity And High Communication Overheadmentioning
confidence: 99%
“…Furthermore, Shi [30] was able to detect attacks in the initialization phase when combining the Low Energy Adaptive Clustering Hierarchy (LEACH) protocol features with RSSI-ID tables. Still in WSN, Gu [31,32] used the K-nest and SVM algorithm in RSSI to achieve high detection efficiency and low error detection rate. However, the algorithm consumes too much detection time.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, Sybil attacks have been studied in the context of Vehicular Ad-hoc Networks (VANETs) [7,11,12]. In [7], the authors built an event-based reputation system that feeds a trust management system that restricts the dissemination of false messages.…”
Section: Managing Sybil Attacks and Collusionsmentioning
confidence: 99%
“…In [7], the authors built an event-based reputation system that feeds a trust management system that restricts the dissemination of false messages. In [11,12], the authors use driving patterns of vehicles and detect Sybils using classifiers, such as minimum distance classifier and support vector machines. In location-based social networks, [15] states that it is not normal the appearance of continuous gatherings, and use the detection of these events to identify Sybils.…”
Section: Managing Sybil Attacks and Collusionsmentioning
confidence: 99%