Replica attack detection method for vehicular ad hoc networks with sequential trajectory segment
In vehicular ad hoc networks, attackers can disguise as replicas of legitimate vehicles by cracking or colluding and then use the identity replicas in a malicious way. Not only the generation of replicas itself poses an aggressive behavior, but also the replicas can enable other insider attacks, suc...
| Published in: | International Journal of Distributed Sensor Networks |
|---|---|
| Main Authors: | , |
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2019-02-01
|
| Online Access: | https://doi.org/10.1177/1550147719827500 |
