메뉴 건너뛰기




Volumn 6, Issue 4, 2013, Pages 523-538

Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support

Author keywords

Roadside unit; Security; Sybil attack; Temporary certificates; Vehicular ad hoc network

Indexed keywords

COMPUTER CRIME; DISTRIBUTED COMPUTER SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; ROADSIDES; VEHICLES;

EID: 84875667207     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.679     Document Type: Article
Times cited : (41)

References (28)
  • 1
    • 84857921504 scopus 로고    scopus 로고
    • Vehicular networking: a survey and tutorial on requirements, architectures, challenges, standards and solutions
    • Karagiannis G, Altintas O, Ekici E, et al. Vehicular networking: a survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys & Tutorials, Fourth Quarter 2011; 13(4):584-616.
    • (2011) IEEE Communications Surveys & Tutorials, Fourth Quarter , vol.13 , Issue.4 , pp. 584-616
    • Karagiannis, G.1    Altintas, O.2    Ekici, E.3
  • 2
    • 33745948310 scopus 로고    scopus 로고
    • The security of vehicular ad hoc networks. Proc. of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) November
    • Raya M, Hubaux J-P. The security of vehicular ad hoc networks. Proc. of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) November 2005; 11-21.
    • (2005) , pp. 11-21
    • Raya, M.1    Hubaux, J.-P.2
  • 4
    • 33845564340 scopus 로고    scopus 로고
    • Securing vehicular communications. IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications
    • Raya M, Papadimitratos P, Hubaux J-P. Securing vehicular communications. IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications 2006; 13(5): 8-15.
    • (2006) , vol.13 , Issue.5 , pp. 8-15
    • Raya, M.1    Papadimitratos, P.2    Hubaux, J.-P.3
  • 5
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil attack. Proc. of International Workshop on Peer-to-Peer Systems
    • Douceur J. The Sybil attack. Proc. of International Workshop on Peer-to-Peer Systems 2002; 251-260.
    • (2002) , pp. 251-260
    • Douceur, J.1
  • 6
    • 1342281463 scopus 로고    scopus 로고
    • The threat of intelligent collisions
    • Blum J, Eskandarian J. The threat of intelligent collisions. IT Professional 2004; 6(1):24-29.
    • (2004) IT Professional , vol.6 , Issue.1 , pp. 24-29
    • Blum, J.1    Eskandarian, J.2
  • 7
    • 44649172603 scopus 로고    scopus 로고
    • Using TPMs to secure vehicular ad-hoc networks (VANETs). Proc. of WISTP
    • Guette G, Bryce C. Using TPMs to secure vehicular ad-hoc networks (VANETs). Proc. of WISTP 2008; 106-116.
    • (2008) , pp. 106-116
    • Guette, G.1    Bryce, C.2
  • 8
    • 50249136655 scopus 로고    scopus 로고
    • On the Sybil attack detection in VANET. Proc. of IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS) October
    • Guette G, Ducourthial B. On the Sybil attack detection in VANET. Proc. of IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS) October 2007; 1-6.
    • (2007) , pp. 1-6
    • Guette, G.1    Ducourthial, B.2
  • 9
    • 58149526685 scopus 로고    scopus 로고
    • Defending mechanisms against Sybil attack in next generation mobile ad hoc networks
    • Pal S, Mukhopadhyay AK, Bhattacharya PP. Defending mechanisms against Sybil attack in next generation mobile ad hoc networks. IETE Technical Review 2008; 25(4):209-214.
    • (2008) IETE Technical Review , vol.25 , Issue.4 , pp. 209-214
    • Pal, S.1    Mukhopadhyay, A.K.2    Bhattacharya, P.P.3
  • 10
    • 34247328623 scopus 로고    scopus 로고
    • Detection and localization of Sybil nodes in VANETs. Proc. of Workshop on Dependability issues in Wireless Ad hoc Networks and Sensor Networks
    • Xiao B, Yu B, Gao B. Detection and localization of Sybil nodes in VANETs. Proc. of Workshop on Dependability issues in Wireless Ad hoc Networks and Sensor Networks 2006; 1-8.
    • (2006) , pp. 1-8
    • Xiao, B.1    Yu, B.2    Gao, B.3
  • 11
    • 50249168206 scopus 로고    scopus 로고
    • Privacy-preserving detection of Sybil attacks in vehicular ad hoc networks. Proc. of International Conference on MobiQuitous
    • Zhou T, Choudhury RR, Ning P, Chakrabarty K. Privacy-preserving detection of Sybil attacks in vehicular ad hoc networks. Proc. of International Conference on MobiQuitous 2007; 1-8.
    • (2007) , pp. 1-8
    • Zhou, T.1    Choudhury, R.R.2    Ning, P.3    Chakrabarty, K.4
  • 13
    • 77951463026 scopus 로고    scopus 로고
    • Defense against Sybil attack in vehicular ad-hoc network based on roadside units support. Proc. of IEEE Military Communications Conference (MILCOM) October
    • Park S, Aslam B, Turgut D, Zou C. Defense against Sybil attack in vehicular ad-hoc network based on roadside units support. Proc. of IEEE Military Communications Conference (MILCOM) October 2009; 1-7.
    • (2009) , pp. 1-7
    • Park, S.1    Aslam, B.2    Turgut, D.3    Zou, C.4
  • 15
    • 85124059044 scopus 로고    scopus 로고
    • Reliable traffic information propagation in vehicular Ad hoc networks
    • In, Beyah R, McNair J, Corbett C (eds). World Scientific Press, Singapore:
    • Park S, Zou C, Turgut D. Reliable traffic information propagation in vehicular Ad hoc networks. In Security in Ad-hoc and Sensor Networks, Beyah R, McNair J, Corbett C (eds). World Scientific Press, Singapore: 2009; 261-291.
    • (2009) Security in Ad-hoc and Sensor Networks , pp. 261-291
    • Park, S.1    Zou, C.2    Turgut, D.3
  • 16
    • 33845926634 scopus 로고    scopus 로고
    • An RSSI-based scheme for Sybil attack detection in wireless sensor networks. Proc. of International Symposium on World of Wireless, Mobile and Multimedia Networks
    • Demirbas M, Song Y. An RSSI-based scheme for Sybil attack detection in wireless sensor networks. Proc. of International Symposium on World of Wireless, Mobile and Multimedia Networks 2006; 564-570.
    • (2006) , pp. 564-570
    • Demirbas, M.1    Song, Y.2
  • 17
    • 60349099898 scopus 로고    scopus 로고
    • Detecting the Sybil Attack cooperatively in wireless sensor networks. Proc. of International Conference on Computational Intelligence and Security (CIS)
    • Lv S, Wang X, Zhao X, Zhou X. Detecting the Sybil Attack cooperatively in wireless sensor networks. Proc. of International Conference on Computational Intelligence and Security (CIS) 2008; 442-446.
    • (2008) , pp. 442-446
    • Lv, S.1    Wang, X.2    Zhao, X.3    Zhou, X.4
  • 18
    • 79960968694 scopus 로고    scopus 로고
    • p), Studies in Computational Intelligence, Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Springer
    • p), Studies in Computational Intelligence, Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Springer 2011; 368: 127-140.
    • (2011) , vol.368 , pp. 127-140
    • Abdurahmonov, T.1    Yeoh, E.2    Hussain, H.M.3
  • 19
    • 37849048533 scopus 로고    scopus 로고
    • Efficient and robust pseudonymous authentication in VANET. Proc. of the Workshop on Vehicular Ad Hoc Networks (VANET) .
    • Calandriello G, Papadimitratos P, Lloy A, Hubaux J-P. Efficient and robust pseudonymous authentication in VANET. Proc. of the Workshop on Vehicular Ad Hoc Networks (VANET) 2007.
    • (2007)
    • Calandriello, G.1    Papadimitratos, P.2    Lloy, A.3    Hubaux, J.-P.4
  • 21
    • 84875654472 scopus 로고    scopus 로고
    • CARAVAN: providing location privacy for VANET. Proc. of Embedded Security in Cars (ESCAR) Nov. .
    • Sampigethaya K, Huang L, Li M, Poovendran R, Matsuura K, Sezaki K. CARAVAN: providing location privacy for VANET. Proc. of Embedded Security in Cars (ESCAR) Nov. 2005.
    • (2005)
    • Sampigethaya, K.1    Huang, L.2    Li, M.3    Poovendran, R.4    Matsuura, K.5    Sezaki, K.6
  • 22
    • 79951985228 scopus 로고    scopus 로고
    • A secure and efficient RSU-aided bundle forwarding protocol for vehicular delay tolerant networks. Special Issue on Network Security and Digital Forensics in Next Generation Communications of Wiley's Wireless Communications and Mobile Computing Journal February
    • Lin X, Chen H-H. A secure and efficient RSU-aided bundle forwarding protocol for vehicular delay tolerant networks. Special Issue on Network Security and Digital Forensics in Next Generation Communications of Wiley's Wireless Communications and Mobile Computing Journal February 2011; 11(2): 187-195.
    • (2011) , vol.11 , Issue.2 , pp. 187-195
    • Lin, X.1    Chen, H.-H.2
  • 23
    • 70449565205 scopus 로고    scopus 로고
    • Tacking together efficient authentication, revocation and privacy in VANETs. Proc. of SECON June
    • Studer A, Shi E, Bai E, Perrig E. Tacking together efficient authentication, revocation and privacy in VANETs. Proc. of SECON June 2009; 1-9.
    • (2009) , pp. 1-9
    • Studer, A.1    Shi, E.2    Bai, E.3    Perrig, E.4
  • 24
    • 84255195592 scopus 로고    scopus 로고
    • LPA: a new location-based privacy-preserving authentication protocol in VANET. Special Issue on Focus on Security and Privacy in Emerging Information Technologies of Wiley's Security and Communication Networks Journal January
    • Xue X, Ding J. LPA: a new location-based privacy-preserving authentication protocol in VANET. Special Issue on Focus on Security and Privacy in Emerging Information Technologies of Wiley's Security and Communication Networks Journal January 2012; 5(1): 69-78.
    • (2012) , vol.5 , Issue.1 , pp. 69-78
    • Xue, X.1    Ding, J.2
  • 25
    • 3042785862 scopus 로고    scopus 로고
    • The Sybil attack in sensor networks: analysis & defenses. Proc. of International Symposium on Information Processing in Sensor Networks
    • Newsome J, Shi E, Song D, Perrig A. The Sybil attack in sensor networks: analysis & defenses. Proc. of International Symposium on Information Processing in Sensor Networks 2004; 259-268.
    • (2004) , pp. 259-268
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 27
    • 84875645111 scopus 로고    scopus 로고
    • Introduction to Probability. Athena Scientific; 2nd edition
    • Bertsekas DP, Tsitsiklis JN. Introduction to Probability. Athena Scientific; 2nd edition, 2008.
    • (2008)
    • Bertsekas, D.P.1    Tsitsiklis, J.N.2
  • 28
    • 47249117927 scopus 로고    scopus 로고
    • An AAA study for service provisioning in vehicular networks. Proc. of IEEE LCN October
    • Coronado E, Cherkaoui S. An AAA study for service provisioning in vehicular networks. Proc. of IEEE LCN October 2007; 669-676.
    • (2007) , pp. 669-676
    • Coronado, E.1    Cherkaoui, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.