A Macroscopic Traffic Model-based Approach for Sybil Attack Detection in VANETs
暂无分享,去创建一个
[1] Mario Gerla,et al. Ghost: Concealing vehicular botnet communication in the VANET control channel , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).
[2] Mario Gerla,et al. INTERLOC: An interference-aware RSSI-based localization and sybil attack detection mechanism for vehicular ad hoc networks , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[3] Mario Gerla,et al. Localization of Sybil Nodes with Electro-Acoustic Positioning in VANETs , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[4] Harold J Payne,et al. MODELS OF FREEWAY TRAFFIC AND CONTROL. , 1971 .
[5] Hussein Zedan,et al. A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..
[6] M J Lighthill,et al. On kinematic waves II. A theory of traffic flow on long crowded roads , 1955, Proceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences.
[7] J. Maxwell. A Treatise on Electricity and Magnetism , 1873, Nature.
[8] Jizhong Zhao,et al. Footprint: Detecting Sybil Attacks in Urban Vehicular Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[9] Sihem Kechida,et al. A piecewise switched linear approach for traffic flow modeling , 2017, Int. J. Autom. Comput..
[10] Samia Boubaker,et al. Comparative analysis of microscopic models of road traffic data , 2011, 2011 4th International Conference on Logistics.
[11] Lata Ragha,et al. Mitigation of attack on authenticating identities in ad-hoc network , 2017, 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS).
[12] Mohamed Khalil,et al. Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks , 2018, 2018 Wireless Days (WD).
[13] Jian Wang,et al. A secure positioning algorithm against Sybil attack in wireless sensor networks based on number allocating , 2017, 2017 IEEE 17th International Conference on Communication Technology (ICCT).
[14] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[15] Rida Khatoun,et al. k-Nearest Neighbours classification based Sybil attack detection in Vehicular networks , 2017, 2017 Third International Conference on Mobile and Secure Services (MobiSecServ).