{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:19:31Z","timestamp":1759133971940},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,2,26]],"date-time":"2014-02-26T00:00:00Z","timestamp":1393372800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s11277-014-1659-5","type":"journal-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T08:22:10Z","timestamp":1393316530000},"page":"2649-2673","source":"Crossref","is-referenced-by-count":25,"title":["On Secure and Privacy-Aware Sybil Attack Detection in Vehicular Communications"],"prefix":"10.1007","volume":"77","author":[{"given":"Rasheed","family":"Hussain","sequence":"first","affiliation":[]},{"given":"Heekuck","family":"Oh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,2,26]]},"reference":[{"key":"1659_CR1","doi-asserted-by":"crossref","unstructured":"Chen, C., Xin, W., Weili, H., & Binyu, Z. (2009). A robust detection of the sybil attack in urban VANETs. In 29th IEEE international conference on distributed computing systems workshops, ICDCS Workshops \u201909 (pp. 270\u2013276).","DOI":"10.1109\/ICDCSW.2009.48"},{"key":"1659_CR2","unstructured":"Chenxi, Z., Rongxing, L., Xiaodong, L., Pin-Han, H., & Xuemin, S. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In IEEE INFOCOM, The 27th Conference on Computer Communications (pp. 246\u2013250)."},{"key":"1659_CR3","doi-asserted-by":"crossref","unstructured":"Costa, P., Gavidia, D., Koldehofe, B., Miranda, H., Musolesi, M., & Riva, O. (2008). When cars start gossiping. In Proceedings of the 6th workshop on Middleware for network eccentric and mobile applications, ACM, Glasgow, Scotland (pp. 1\u20134).","DOI":"10.1145\/1435467.1435468"},{"key":"1659_CR4","unstructured":"Delgrossi, L., & Zhang, T. (2009). Dedicated Short-Range Communications. Vehicle Safety Communications: Protocols, Security, and Privacy (pp. 44\u201351)."},{"key":"1659_CR5","doi-asserted-by":"crossref","unstructured":"Douceur, J. R. (2002). The sybil attack. International Workship on Peer to Peer Systems (pp. 251\u2013260).","DOI":"10.1007\/3-540-45748-8_24"},{"key":"1659_CR6","doi-asserted-by":"crossref","unstructured":"Gerlach, M., & Guttler, F. (2007). Privacy in VANETs using changing pseudonyms\u2014ideal and real. In IEEE 65th Vehicular Technology Conference, VTC2007-Spring (pp. 2521\u20132525).","DOI":"10.1109\/VETECS.2007.519"},{"key":"1659_CR7","doi-asserted-by":"crossref","unstructured":"Grover, J., Gaur, M. S., & Laxmi, V. (2010). A novel defense mechanism against sybil attacks in VANET. In Proceedings of the 3rd international conference on security of information and networks, ACM, Taganrog, Rostov-on-Don, Russian Federation (pp. 249\u2013255).","DOI":"10.1145\/1854099.1854150"},{"key":"1659_CR8","unstructured":"Grover, J., Gaur, M. S., & Laxmi, V. (2011). Sybil Attack in VANETs- Detection and Prevention (pp. 269\u2013294). Security of Self-Organizing Networks, Taylor and Francis Group, LLC."},{"key":"1659_CR9","doi-asserted-by":"crossref","unstructured":"Guette, G., & Ducourthial, B. (2007). On the Sybil attack detection in VANET. IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS 2007 (pp. 1\u20136).","DOI":"10.1109\/MOBHOC.2007.4428742"},{"key":"1659_CR10","doi-asserted-by":"crossref","unstructured":"Hussain, R., Kim, S., & Oh, H. (2012). Privacy-aware VANET security: Putting data-centric misbehavior and sybil attack detection schemes into practice. Internet Security Applications, 2012 (WISA 2012) (pp. 296\u2013311).","DOI":"10.1007\/978-3-642-35416-8_21"},{"key":"1659_CR11","first-page":"268","volume-title":"Towards privacy aware pseudonymless strategy for avoiding profile generation in VANET","author":"R Hussain","year":"2009","unstructured":"Hussain, R., Kim, S., & Oh, H. (2009). Information security applications. In H. Youm & M. Yung (Eds.), Towards privacy aware pseudonymless strategy for avoiding profile generation in VANET (pp. 268\u2013280). Berlin\/Heidelberg: Springer."},{"key":"1659_CR12","doi-asserted-by":"crossref","unstructured":"Ibrahim, K., & Weigle, M. C. (2008). CASCADE: Cluster-based accurate syntactic compression of aggregated data in VANETs. In IEEE GLOBECOM Workshops (pp. 1\u201310).","DOI":"10.1109\/GLOCOMW.2008.ECP.59"},{"key":"1659_CR13","doi-asserted-by":"crossref","unstructured":"Ibrahim, K., Weigle, M. C., & Abuelela, M. (2009). p-IVG: Probabilistic inter-vehicle geocast for dense vehicular networks. In IEEE 69th Vehicular Technology Conference. VTC Spring (pp. 1\u20135).","DOI":"10.1109\/VETECS.2009.5073804"},{"key":"1659_CR14","doi-asserted-by":"crossref","first-page":"1227","DOI":"10.1109\/TPDS.2010.14","volume":"21","author":"S Jinyuan","year":"2010","unstructured":"Jinyuan, S., Chi, Z., Yanchao, Z., & Yuguang, F. (2010). An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Transactions on Parallel and Distributed Systems, 21, 1227\u20131239.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"1659_CR15","doi-asserted-by":"crossref","unstructured":"Leinmuller, T., Schoch, E., & Maihofer, C. (2007). Security requirements and solution concepts in vehicular ad hoc networks. Wireless on demand network systems and services, WONS \u201907. Fourth Annual Conference on (pp. 84\u201391).","DOI":"10.1109\/WONS.2007.340489"},{"key":"1659_CR16","volume-title":"A survey of solutions to the sybil attack","author":"AN Levine","year":"2006","unstructured":"Levine, A. N., Shields, C., & Margolin, N. B. (2006). A survey of solutions to the sybil attack. Amherst, MA: University of Massachusetts."},{"key":"1659_CR17","doi-asserted-by":"crossref","unstructured":"Martucci, L. A., Kohlweiss, M., Andersson, C., & Panchenko, A. (2008). Self-certified Sybil-free pseudonyms. In Proceedings of the first ACM conference on Wireless network security (pp. 154\u2013159). ACM, Alexandria, VA, USA.","DOI":"10.1145\/1352533.1352558"},{"key":"1659_CR18","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., et al. (2008). Secure vehicular communication systems: Design and architecture. IEEE Communications Magazine, 46, 100\u2013109.","DOI":"10.1109\/MCOM.2008.4689252"},{"key":"1659_CR19","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1016\/j.csi.2008.03.007","volume":"30","author":"K Pl\u00f6\u00dfl","year":"2008","unstructured":"Pl\u00f6\u00dfl, K., & Federrath, H. (2008). A privacy aware and efficient security infrastructure for vehicular ad hoc networks. Computer Standards & Interfaces, 30, 390\u2013397.","journal-title":"Computer Standards & Interfaces"},{"key":"1659_CR20","doi-asserted-by":"crossref","unstructured":"Ruj, S., Cavenaghi, M. A., Zhen, H., Nayak, A., & Stojmenovic, I. (2011). On data-centric misbehavior detection in VANETs. IEEE Vehicular Technology Conference (VTC Fall) (pp. 1\u20135).","DOI":"10.1109\/VETECF.2011.6093096"},{"key":"1659_CR21","doi-asserted-by":"crossref","unstructured":"Scheuer, F., Posse, K., & Federrath, H. (2008). Preventing profile generation in vehicular networks. networking and communications, WIMOB \u201908. IEEE International Conference on Wireless and Mobile, Computing (pp. 520\u2013525).","DOI":"10.1109\/WiMob.2008.45"},{"key":"1659_CR22","unstructured":"Schmidt, R. K., Leinmuller, T., Schoch, E., Held, A., & Schafer, G. (2008). Vehicle behavior analysis to enhance security in vanets. Fourth workshop on vehicle to vehicle, communications (V2VCOM 2008)."},{"key":"1659_CR23","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MNET.2010.5395778","volume":"24","author":"R Schmidt","year":"2010","unstructured":"Schmidt, R., Leinmuller, T., Schoch, E., Kargl, F., & Schafer, G. (2010). Exploration of adaptive beaconing for efficient intervehicle safety communication. IEEE Network, 24, 14\u201319.","journal-title":"IEEE Network"},{"key":"1659_CR24","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.1109\/TPDS.2011.263","volume":"23","author":"C Shan","year":"2012","unstructured":"Shan, C., Yong, Q., Hongzi, Z., Jizhong, Z., & Xuemin, S. (2012). Footprint: Detecting sybil attacks in urban vehicular networks. IEEE Transactions on Parallel and Distributed Systems, 23, 1103\u20131114.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"1659_CR25","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1109\/MCOM.2011.5762815","volume":"49","author":"C Sommer","year":"2011","unstructured":"Sommer, C., Tonguz, O. K., & Dressler, F. (2011). Traffic information systems: Efficient message dissemination via adaptive beaconing. IEEE Communications Magazine, 49, 173\u2013179.","journal-title":"IEEE Communications Magazine"},{"key":"1659_CR26","first-page":"1","volume":"2009","author":"P Soyoung","year":"2009","unstructured":"Soyoung, P., Aslam, B., Turgut, D., & Zou, C. C. (2009). Defense against Sybil attack in vehicular ad hoc network based on roadside unit support. IEEE Military Communications Conference, MILCOM, 2009, 1\u20137.","journal-title":"IEEE Military Communications Conference, MILCOM"},{"key":"1659_CR27","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1109\/JSAC.2011.110308","volume":"29","author":"Z Tong","year":"2011","unstructured":"Tong, Z., Choudhury, R. R., Peng, N., & Chakrabarty, K. (2011). P2DAP: Sybil attacks detection in vehicular ad hoc networks. IEEE Journal on Selected Areas in Communications, 29, 582\u2013594.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"1659_CR28","first-page":"1","volume":"2008","author":"A Wasef","year":"2008","unstructured":"Wasef, A., Yixin, J., & Xuemin, S. (2008). ECMV: Efficient certificate management scheme for vehicular networks. IEEE Global Telecommunications Conference, GLOBECOM, 2008, 1\u20135.","journal-title":"IEEE Global Telecommunications Conference, GLOBECOM"},{"key":"1659_CR29","unstructured":"Xiao, B., Yu, B., & Gao, C. (2006). Detection and localization of sybil nodes in VANETs. In Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks. (pp. 1\u20138). Los Angeles, CA, USA: ACM."},{"key":"1659_CR30","doi-asserted-by":"crossref","first-page":"3589","DOI":"10.1109\/TVT.2010.2051468","volume":"59","author":"S Yipin","year":"2010","unstructured":"Yipin, S., Rongxing, L., Xiaodong, L., Xuemin, S., & Jinshu, S. (2010). An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Transactions on Vehicular Technology, 59, 3589\u20133603.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"1659_CR31","doi-asserted-by":"crossref","unstructured":"Yong, H., Jin, T., & Yu, C. (2011). Cooperative sybil attack detection for position based applications in privacy preserved VANETs. In IEEE Global Telecommunications Conference (GLOBECOM 2011) (pp. 1\u20135).","DOI":"10.1109\/GLOCOM.2011.6134242"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-014-1659-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-014-1659-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-014-1659-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T19:31:12Z","timestamp":1565206272000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-014-1659-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,26]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["1659"],"URL":"https:\/\/doi.org\/10.1007\/s11277-014-1659-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2,26]]}}}