2018
DOI: 10.1504/ijict.2018.095025
|View full text |Cite
|
Sign up to set email alerts
|

Sybil attack resistant location privacy in VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Messages transmitted in the network must be guaranteed from modification, or insertion in the VANET. Security requirements for VANETs have been identified to be availability, integrity, confidentiality, authentication, non-repudiation, and traceability [ 6 , 13 , 15 ]. The high mobility, rapidly changing network topology, limited transmission power, volatility in network connections and boundless network size present a challenge for VANETs to achieve their security requirements [ 7 , 16 ].…”
Section: Introductionmentioning
confidence: 99%
“…Messages transmitted in the network must be guaranteed from modification, or insertion in the VANET. Security requirements for VANETs have been identified to be availability, integrity, confidentiality, authentication, non-repudiation, and traceability [ 6 , 13 , 15 ]. The high mobility, rapidly changing network topology, limited transmission power, volatility in network connections and boundless network size present a challenge for VANETs to achieve their security requirements [ 7 , 16 ].…”
Section: Introductionmentioning
confidence: 99%