Author:
Grover Jyoti,Laxmi Vijay,Gaur Manoj Singh
Publisher
Springer Science and Business Media LLC
Subject
General Earth and Planetary Sciences,General Engineering,General Environmental Science
Reference37 articles.
1. Aijaz A, Bochow B, Dtzer F, Festag A, Gerlach M, Kroh R, Leinmller T (2006) Attacks on inter vehicle communication systems—an analysis. In: Proceedings of WIT, pp 189–194
2. Raya M, Hubaux JP (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39–68
3. Plossl K, Nowey T, Mletzko C (2006) Towards a security architecture for vehicular ad hoc networks. In: The first international conference on availability, reliability and security, 2006 (ARES 2006), p 8
4. Douceur JR (2002) The Sybil attack. In: IPTPS ’01: revised papers from the first international workshop on peer-to-peer systems. Springer, London, pp 251–260
5. Raya M, Papadimitratos P, Hubaux J-P (2006) Securing vehicular communications. IEEE Wirel Commun Mag 13(5):8–15 (Special issue on inter-vehicular communications)
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. RSSI-Based Sybil Attack Detection Under Fading Channel in VANET;ICC 2023 - IEEE International Conference on Communications;2023-05-28
2. A Comprehensive Survey of V2X Cybersecurity Mechanisms and Future Research Paths;IEEE Open Journal of the Communications Society;2023
3. IoT Security Vulnerabilities and Defensive Measures in Industry 4.0;Artificial Intelligence and Cyber Security in Industry 4.0;2023
4. Effect Sybil attack on security Authentication Service in VANET;2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA);2022-06-09
5. Detecting Sinkhole Attacks in IoT-Based Wireless Sensor Networks Using Distance From Base Station;International Journal of Information System Modeling and Design;2022-04-22