Vehicular Platoons Security: A Review with an Emphasis on Sybil Attacks.
Yosra HassineHaifa TouatiPublished in: PEMWN (2023)
Keyphrases
- malicious users
- security threats
- security mechanisms
- security problems
- malicious nodes
- computer security
- security measures
- java card
- security vulnerabilities
- cyber attacks
- security protocols
- security issues
- countermeasures
- denial of service attacks
- security risks
- fault injection
- security breaches
- malicious attacks
- cryptographic protocols
- wireless sensor networks
- information security
- intrusion detection
- chosen plaintext
- stream cipher
- biometric template
- cryptographic algorithms
- cyber security
- security requirements
- dos attacks
- security flaws
- access control
- key management
- intrusion prevention
- identity theft
- sensitive data
- sql injection
- insider attacks
- security management
- information leakage
- security policies
- traffic flow
- network security
- smart card
- secure routing
- network traffic
- anomaly detection
- buffer overflow
- intrusion detection system
- urban areas
- attack detection
- resource constrained