Detection of Sybil Attack in VANETs
暂无分享,去创建一个
[1] Athanasios V. Vasilakos,et al. Vehicular communication: protocol design, testbed implementation and performance analysis , 2009, IWCMC.
[2] Damla Turgut,et al. Defense against Sybil attack in vehicular ad hoc network based on roadside unit support , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[3] Tim Leinmüller,et al. Improved security in geographic ad hoc routing through autonomous position verification , 2006, VANET '06.
[4] Yevgeni Koucheryavy,et al. Modeling Broadcasting in IEEE 802.11p/WAVE Vehicular Networks , 2011, IEEE Communications Letters.
[5] Khaled Rabieh,et al. Combating Sybil Attacks in Vehicular Ad Hoc Networks , 2011 .
[6] Jose L. Muñoz,et al. PPREM: Privacy Preserving REvocation Mechanism for Vehicular Ad Hoc Networks , 2014, Comput. Stand. Interfaces.
[7] D. Balamahalakshmi. Sybil Attack Detection with Reduced Bandwidth Overhead in Urban Vehicular Networks , 2014 .
[8] Marco Fiore,et al. On the use of a Cooperative Neighbor Position Verification scheme to secure warning message dissemination in VANETs , 2013, 38th Annual IEEE Conference on Local Computer Networks.
[9] Bin Xiao,et al. Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.
[10] Yu Cheng,et al. Cooperative Sybil Attack Detection for Position Based Applications in Privacy Preserved VANETs , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[11] Peng Ning,et al. P2DAP — Sybil Attacks Detection in Vehicular Ad Hoc Networks , 2011, IEEE Journal on Selected Areas in Communications.
[12] ByungKwan Lee,et al. A DTSA (Detection Technique against a Sybil Attack) Protocol using SKC (Session Key based Certificate) on VANET , 2013 .
[13] Zhiyi Fang,et al. Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.
[14] Hossam S. Hassanein,et al. Position verification for vehicular networks via analyzing two-hop neighbors information , 2011, 2011 IEEE 36th Conference on Local Computer Networks.
[15] Jizhong Zhao,et al. Footprint: Detecting Sybil Attacks in Urban Vehicular Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[16] Yan Xiong,et al. A Regional Statistics Detection Scheme against Sybil Attacks in WSNs , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.