Sybil detection in vehicular networks
2013
- 238Usage
Metric Options: CountsSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Metrics Details
- Usage238
- Abstract Views203
- Downloads35
Thesis / Dissertation Description
"A Sybil attack is one where an adversary assumes multiple identities with the purpose of defeating an existing reputation system. When Sybil attacks are launched in vehicular networks, an added challenge in detecting malicious nodes is mobility that makes it increasingly difficult to tie a node to the location of attacks. In this thesis, we present an innovative protocol for Sybil detection in vehicular networks. Considering that vehicular networks are cyber-physical systems integrating cyber and physical components, our technique exploits well grounded results in the physical (i.e., transportation) domain to tackle the Sybil problem in the cyber domain. Compared to existing works that rely on additional cyber hardware support, or complex cryptographic primitives for Sybil detection, the key innovation in our protocol is leverage the theory of platoon dispersion that models the physics of naturally occurring dispersion in roads. Specifically, our technique employs a certain number of roadside units that periodically collect reports from vehicles regarding their physical neighborhood as they move in roads. Leveraging from existing models of platoon dispersion, we design a protocol to detect anomalously close neighborhoods that are reflective of Sybil attacks. To the best of our knowledge, this is the first work integrating a well established theory in transportation engineering for detecting cyber space attacks in vehicular networks. The resulting protocol is naturally simple, efficient and performs very well"--Abstract, page iii.
Bibliographic Details
Missouri University of Science and Technology
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know