[PDF][PDF] A Comprehensive Survey of Routing Attacks and Defense Mechanisms in MANETs

R Deeptha - Management, 2021 - mail.webology.org
… systems as well as anonymous routing in MANETs. Finally, it … In a MANET, the Sybil attack
thoroughly affects the efficiency … Information related to location based on synchronization of …

Detecting sybil attacks using proofs of work and location in vanets

M Baza, M Nabil, MMEA Mahmoud… - … on Dependable and …, 2020 - ieeexplore.ieee.org
… be authenticated anonymously. However, a malicious vehicle may abuse this privacy protection
by launching Sybil attacks [… The PoW is the first line of defense and even if some vehicles …

SIBLAR: a secured identity-based location aware routing protocol for MANETs

R Suma, BG Premasudha… - International Journal of …, 2021 - inderscienceonline.com
… manner, thereby making location-based routing more applicable for … If the routing protocols
do not adopt an authentication … typically attack-based where they could provide a defensive

Leveraging Proofs of Work and Location-Based Strategies for Sybil Attack Detection in VANETs

MI ALI - RES MILITARIS, 2023 - resmilitaris.net
… of pseudonyms to be authenticated anonymously. However, … eliminate Sybil attacks, it also
violates both anonymity and … detect and defend against Sybil attacks in VANETs and more …

[PDF][PDF] RTBSAD: RSSI AND TRUST-BASED SYBIL ATTACK DETECTION IN MANET

M Bharti, S Rani, P Singh - Indian Journal of Computer Science and …, 2022 - ijcse.com
… and anonymously over the internet. They contacted correspondents by wired or infrared
media to authenticate … Privacy-preserving location-based services for mobile users in wireless …

Mitigation of Sybil Attack in Mobile Ad Hoc Network Using CRYPTO-DSR: A Novel Routing Protocol

S Majumder, D Bhattacharyya… - International Journal of …, 2023 - ijisae.org
Defense against Sybil attacks and authentication for anonymous location-based routing
in MANET. Wireless Netw 23, 715–726 (2017). https://doi.org/10.1007/s11276-0151178-7 …

Detecting Sybil Attacks Using Proofs of Work and Location for Vehicular Ad-Hoc Networks (VANETs)

N Bewermeier - 2019 - search.proquest.com
Sybil attack detection scheme for Mobile Ad-hoc Networks (… in order to authenticate themselves,
to launch Sybil attack, a … a Sybil attack detection scheme using anonymous trajectories…

Privacy aware prevention of Sybil attack in vehicular ad hoc networks

R Kumar, N Chauhan, P Kumar, N Chand… - Handbook of Wireless …, 2020 - Springer
… But it lacks anonymity because vehicles use wireless link to … Pal [12] uses an authentication
scheme where certificate is … is Location-Based Privacy-Preserving detection of Sybil attack (L-…

A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks

GM Borkar, AR Mahajan - International Journal of …, 2020 - inderscienceonline.com
… To solve the issue with routing, an anonymous location-based efficient routing protocol (…
the TTP, this authentication scheme offers increased resistance to the Sybil attack. The attacker …

Efficient privacy-preserving scheme for location based services in VANET system

F Farouk, Y Alkady, R Rizk - IEEE Access, 2020 - ieeexplore.ieee.org
… ) is a type of Mobile Ad-hoc Network (MANET) that is used to provide … In sybil attack, the
adversary illegitimately claims … any other anonymity technique to make the user anonymous. …