C Piro, C Shields, BN Levine - 2006 Securecomm and …, 2006 - ieeexplore.ieee.org
… AdhocSybil Identity trusted nodes can join to improve theaccuracy of detection. Detection (PASID), a single node can detect Sybilattacks … traveling together as a Sybil other nodes it …
T Zhou, RR Choudhury, P Ning… - IEEE journal on …, 2011 - ieeexplore.ieee.org
… This section presents our scheme on handling Sybilattacks. The main purpose is to detect Sybilattacks and revoke malicious vehicles immediately after detection. A baseline method is …
S Pal, AK Mukhopadhyay… - IETE Technical …, 2008 - Taylor & Francis
… This paper presents techniques adopted to defend against SybilAttack in Mobile AdHoc Networks. Sybilattack and the existing defense mechanisms against this type of attack have …
… Adhoc networks are vulnerable to numerous attacks due to its infrastructure-less nature, one of these attacks is the Sybilattack. Sybilattack is a severe attack on vehicular adhoc …
T Zhou, RR Choudhury, P Ning… - 2007 Fourth Annual …, 2007 - ieeexplore.ieee.org
… a Sybilattack, wherein a malicious vehicle pretends to be multiple other vehicles. Reported data from a Sybil … and scalable framework to detect Sybilattacks. Importantly, the proposed …
B Yu, CZ Xu, B Xiao - Journal of Parallel and Distributed Computing, 2013 - Elsevier
… Sybilattacks have been regarded as a serious security threat to Adhoc Networks and Sensor Networks. They may also impair the potential applications in Vehicular Adhoc Networks (…
… This paper also introduces a new approach to detect Sybilattack based on clustering as … MANET has a wide application in adhoc voting system. Sybilattack can easily happen in this …
… series approach to defend against Sybilattack in a vehicular adhoc network (VANET) … and RSUs, two messages will be treated as Sybilattack issued by one vehicle if they have the …
D Kushwaha, PK Shukla… - International Journal of …, 2014 - researchgate.net
… Various solutions have been given by authors for these attacks. In this paper we shall consider only Sybilattack in detail. We briefly describe some of the schemes to detect Sybilattack …