메뉴 건너뛰기




Volumn 23, Issue 6, 2012, Pages 1103-1114

Footprint: Detecting Sybil attacks in urban vehicular networks

Author keywords

location privacy; location hidden trajectory; signer ambiguous signature; Sybil attack; urban vehicular networks

Indexed keywords

LINKABILITY; LINKABLE; LOCATION INFORMATION; LOCATION PRIVACY; SECURITY ANALYSIS; SIGNER-AMBIGUOUS SIGNATURE; SOCIAL RELATIONSHIPS; SYBIL ATTACK; TRACE DRIVEN SIMULATION; VEHICULAR NETWORKS;

EID: 84860500466     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2011.263     Document Type: Article
Times cited : (116)

References (25)
  • 1
    • 77956735087 scopus 로고    scopus 로고
    • An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications
    • Sept
    • Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, "An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications," IEEE Trans. Vehicular Technology, vol. 59, no. 7, pp. 3589-3603, Sept. 2010.
    • (2010) IEEE Trans. Vehicular Technology , vol.59 , Issue.7 , pp. 3589-3603
    • Sun, Y.1    Lu, R.2    Lin, X.3    Shen, X.4    Su, J.5
  • 2
    • 77954592983 scopus 로고    scopus 로고
    • An intelligent secure and privacy-preserving parking scheme through vehicular communications
    • July
    • R. Lu, X. Lin, H. Zhu, and X. Shen, "An Intelligent Secure and Privacy-Preserving Parking Scheme through Vehicular Communications," IEEE Trans. Vehicular Technology, vol. 59, no. 6, pp. 2772-2785, July 2010.
    • (2010) IEEE Trans. Vehicular Technology , vol.59 , Issue.6 , pp. 2772-2785
    • Lu, R.1    Lin, X.2    Zhu, H.3    Shen, X.4
  • 4
    • 60149104098 scopus 로고    scopus 로고
    • Cabernet: Vehicular content delivery using wifi
    • Sept
    • J. Eriksson, H. Balakrishnan, and S. Madden, "Cabernet: Vehicular Content Delivery Using WiFi," Proc. MOBICOM '08, pp. 199-210, Sept. 2008.
    • (2008) Proc. MOBICOM '08 , pp. 199-210
    • Eriksson, J.1    Balakrishnan, H.2    Madden, S.3
  • 6
  • 8
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public key management for mobile ad hoc networks
    • Jan.-Mar
    • S. Capkun, L. Buttyan, and J. Hubaux, "Self-Organized Public Key Management for Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 2, no. 1, pp. 52-64, Jan.-Mar. 2003.
    • (2003) IEEE Trans. Mobile Computing , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.3
  • 11
    • 21644485107 scopus 로고    scopus 로고
    • Preserving peer replicas by rate-limited sampled voting
    • SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
    • P. Maniatis, D.S.H. Rosenthal, M. Roussopoulos, M. Baker, T. Giuli, and Y. Muliadi, "Preserving Peer Replicas by Rate-Limited Sampled Voting," Proc. 19th ACM Symp. Operating Systems Principles (SOSP '03), pp. 44-59, Oct. 2003. (Pubitemid 40929687)
    • (2003) Operating Systems Review (ACM) , vol.37 , Issue.5 , pp. 44-59
    • Maniatis, P.1    Rosenthal, D.S.H.2    Roussopoulos, M.3    Baker, M.4    Giuli, T.J.5    Muliadi, Y.6
  • 12
    • 33750285481 scopus 로고    scopus 로고
    • SybilGuard: Defending against sybil attacks via social networks
    • DOI 10.1145/1151659.1159945
    • H. Yu, M. Kaminsky, P.B. Gibbons, and A. Flaxman, "Sybilguard: Defending against Sybil Attacks via Social Networks," Proc. SIGCOMM, pp. 267-278, Sept. 2006. (Pubitemid 44623733)
    • (2006) Computer Communication Review , vol.36 , Issue.4 , pp. 267-278
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4
  • 13
    • 70349947496 scopus 로고    scopus 로고
    • Sybil nodes detection based on received signal strength variations within vanet
    • M.S. Bouassida, G. Guette, M. Shawky, and B. Ducourthial, "Sybil Nodes Detection Based on Received Signal Strength Variations within Vanet," Int'l J. Network Security, vol. 9, no. 1, pp. 22-32, 2009.
    • (2009) Int'l J. Network Security , vol.9 , Issue.1 , pp. 22-32
    • Bouassida, M.S.1    Guette, G.2    Shawky, M.3    Ducourthial, B.4
  • 16
    • 77249157951 scopus 로고    scopus 로고
    • Balanced trustworthiness, safety and privacy in vehicle-to-vehicle communications
    • Feb
    • Q. Wu, J. Domingo-Ferrer, and U. Gonzalez-Nicolá s, "Balanced Trustworthiness, Safety and Privacy in Vehicle-to-vehicle Communications," IEEE Trans. Vehicular Technology, vol. 59, no. 2, pp. 559-573, Feb. 2010.
    • (2010) IEEE Trans. Vehicular Technology , vol.59 , Issue.2 , pp. 559-573
    • Wu, Q.1    Domingo-Ferrer, J.2    Gonzalez-Nicolá, U.3
  • 17
    • 79951969637 scopus 로고    scopus 로고
    • Threshold anonymous announcement in vanets
    • Mar
    • L. Chen, S.-L. Ng, and G. Wang, "Threshold Anonymous Announcement in VANETs," IEEE J. Selected Areas in Comm., vol. 29, no. 3, pp. 1-11, Mar. 2011.
    • (2011) IEEE J. Selected Areas in Comm. , vol.29 , Issue.3 , pp. 1-11
    • Chen, L.1    Ng, S.-L.2    Wang, G.3
  • 23
    • 24644461219 scopus 로고    scopus 로고
    • Short linkable ring signatures for E-voting, E-cash and attestation
    • Information Security Practice and Experience - First International Conference, ISPEC 2005, Proceedings
    • P.P. Tsang and V.K. Wei, "Short Linkable Ring Signatures for EVoting, E-Cash and Attestation," Proc. Information Security Practice and Experience Conf. (ISPEC '05), pp. 48-60, 2005. (Pubitemid 41273777)
    • (2005) Lecture Notes in Computer Science , vol.3439 , pp. 48-60
    • Tsang, P.P.1    Wei, V.K.2
  • 25
    • 84867997005 scopus 로고    scopus 로고
    • A fast algorithm for the maximum clique problem
    • P.R. Ostergard, "A Fast Algorithm for the Maximum Clique Problem," Discrete Applied Math., vol. 120, nos. 1-3, pp. 197-207, 2002.
    • (2002) Discrete Applied Math. , vol.120 , Issue.1-3 , pp. 197-207
    • Ostergard, P.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.