Articles with "sybil attack" as a keyword



Photo from wikipedia

A Macroscopic Traffic Model-based Approach for Sybil Attack Detection in VANETs

Sign Up to like & get
recommendations!
Published in 2019 at "Ad Hoc Networks"

DOI: 10.1016/j.adhoc.2019.01.010

Abstract: Abstract Vehicular Ad Hoc Networks (VANETs) are expected to play an important role in our lives. They will improve traffic safety and bring a revolution on the driving experience. However, these benefits are counterbalanced by… read more here.

Keywords: model; sybil attack; traffic; attack detection ... See more keywords
Photo from wikipedia

Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Intelligent Transportation Systems"

DOI: 10.1109/tits.2022.3165513

Abstract: In the context of current smart cities, Cooperative Intelligent Transportation Systems (C-ITS) represent one of the main use case scenarios that aim to improve peoples’ daily lives. Thus, during the last few years, numerous standards… read more here.

Keywords: sybil attack; detect sybil; sybil; sybil attacks ... See more keywords
Photo by nampoh from unsplash

Multi-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using RSSI

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Mobile Computing"

DOI: 10.1109/tmc.2018.2833849

Abstract: Vehicular Ad Hoc Networks (VANETs) bring many benefits and conveniences to road safety and drive comfort in future transportation systems. However, VANETs suffer from almost all security issues as same as wireless networks. Sybil attack… read more here.

Keywords: vehicular hoc; attack detection; hoc networks; sybil attack ... See more keywords
Photo by nampoh from unsplash

Sybil in the Haystack: A Comprehensive Review of Blockchain Consensus Mechanisms in Search of Strong Sybil Attack Resistance

Sign Up to like & get
recommendations!
Published in 2023 at "Algorithms"

DOI: 10.3390/a16010034

Abstract: Consensus algorithms are applied in the context of distributed computer systems to improve their fault tolerance. The explosive development of distributed ledger technology following the proposal of “Bitcoin” led to a sharp increase in research… read more here.

Keywords: sybil attack; resistance; attack; attack resistance ... See more keywords