… be authenticatedanonymously. However, a malicious vehicle may abuse this privacy protection by launching Sybilattacks [… The PoW is the first line of defense and even if some vehicles …
R Suma, BG Premasudha… - International Journal of …, 2021 - inderscienceonline.com
… manner, thereby making location-basedrouting more applicable for … If the routing protocols do not adopt an authentication … typically attack-based where they could provide a defensive …
… of pseudonyms to be authenticatedanonymously. However, … eliminate Sybilattacks, it also violates both anonymity and … detect and defend against Sybilattacks in VANETs and more …
M Bharti, S Rani, P Singh - Indian Journal of Computer Science and …, 2022 - ijcse.com
… and anonymously over the internet. They contacted correspondents by wired or infrared media to authenticate … Privacy-preserving location-based services for mobile users in wireless …
S Majumder, D Bhattacharyya… - International Journal of …, 2023 - ijisae.org
… Defense against Sybilattacks and authentication for anonymouslocation-basedrouting in MANET. Wireless Netw 23, 715–726 (2017). https://doi.org/10.1007/s11276-0151178-7 …
… Sybilattack detection scheme for MobileAd-hocNetworks (… in order to authenticate themselves, to launch Sybilattack, a … a Sybilattack detection scheme using anonymous trajectories…
… But it lacks anonymity because vehicles use wireless link to … Pal [12] uses an authentication scheme where certificate is … is Location-Based Privacy-Preserving detection of Sybilattack (L-…
GM Borkar, AR Mahajan - International Journal of …, 2020 - inderscienceonline.com
… To solve the issue with routing, an anonymouslocation-based efficient routing protocol (… the TTP, this authentication scheme offers increased resistance to the Sybilattack. The attacker …
F Farouk, Y Alkady, R Rizk - IEEE Access, 2020 - ieeexplore.ieee.org
… ) is a type of Mobile Ad-hoc Network (MANET) that is used to provide … In sybilattack, the adversary illegitimately claims … any other anonymity technique to make the user anonymous. …