Autonomous vehicles: Sophisticated attacks, safety issues, challenges, open topics, blockchain, and future directions
A Giannaros, A Karras, L Theodorakopoulos… - … of Cybersecurity and …, 2023 - mdpi.com
Autonomous vehicles (AVs), defined as vehicles capable of navigation and decision-making
independent of human intervention, represent a revolutionary advancement in transportation …
independent of human intervention, represent a revolutionary advancement in transportation …
Sybil attacks and their defenses in the internet of things
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …
Preventing sybil attack in blockchain using distributed behavior monitoring of miners
Blockchain technology is useful with the record keeping of digital transactions, IoT, supply
chain management etc. However, we have observed that the traditional attacks are possible …
chain management etc. However, we have observed that the traditional attacks are possible …
PCTBC: Power control tree-based cluster approach for sybil attack in wireless sensor networks
S Singh, HS Saini - Journal of Circuits, Systems and Computers, 2021 - World Scientific
Wireless Sensor Networks (WSNs) have come across several things which include
collecting data, handling data and distribution for super visioning specific applications such …
collecting data, handling data and distribution for super visioning specific applications such …
[PDF][PDF] A survey on sybil attack in vehicular ad-hoc network
D Kushwaha, PK Shukla… - International Journal of …, 2014 - researchgate.net
Vehicular Ad-hoc network is new and emerging technology. Researchers are gaining
interest in this technology. Due to its open nature it is vulnerable to various attacks. Sybil …
interest in this technology. Due to its open nature it is vulnerable to various attacks. Sybil …
Privacy preservation and drone authentication using Id-Based Signcryption
S Benzarti, B Triki, O Korbaa - New Trends in Intelligent …, 2018 - ebooks.iospress.nl
By the recent years, the use of UAV (Unmanned Aerial Vehicle) also known as drone have
witnessed a remarkable increase. Drones are no longer limited for military services as in the …
witnessed a remarkable increase. Drones are no longer limited for military services as in the …
Localization of sybil nodes with electro-acoustic positioning in VANETs
Sybil attacks are a challenging security threat in ad-hoc and vehicular networks. A malicious
node can successfully launch a Sybil attack with high probability. However, the targeted …
node can successfully launch a Sybil attack with high probability. However, the targeted …
[PDF][PDF] Preserving location privacy in location based services against sybil attacks
AK Tyagi, N Sreenath - International Journal of Security and Its …, 2015 - researchgate.net
With the rapid development of wireless technologies, Privacy of personal location
information of a vehicle ad-hoc network (VANET) users is becoming an increasingly …
information of a vehicle ad-hoc network (VANET) users is becoming an increasingly …
Region authority based collaborative scheme to detect Sybil attacks in VANET
AS Lal, R Nair - … on Control Communication & Computing India …, 2015 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) are increasingly used for traffic control, accident
avoidance, and management of toll stations and public areas. Security and privacy are two …
avoidance, and management of toll stations and public areas. Security and privacy are two …
Sybil attack detection and prevention in VANETs: A survey
VANETs are communication devices that connect vehicles and Roadside Units. The usage
of VANETs in traffic management and toll administration systems has increased recently …
of VANETs in traffic management and toll administration systems has increased recently …