{"id":"https://openalex.org/W3033111552","doi":"https://doi.org/10.1109/csnet47905.2019.9108923","title":"Cloud-based Sybil Attack Detection Scheme for Connected Vehicles","display_name":"Cloud-based Sybil Attack Detection Scheme for Connected Vehicles","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W3033111552","doi":"https://doi.org/10.1109/csnet47905.2019.9108923","mag":"3033111552"},"language":"en","primary_location":{"id":"doi:10.1109/csnet47905.2019.9108923","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet47905.2019.9108923","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 3rd Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067219278","display_name":"Anika Anwar","orcid":"https://orcid.org/0000-0002-7703-7157"},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Anika Anwar","raw_affiliation_strings":["School of Computing, Queen\u2019s University, Kingston, Canada","School of Computing, Queen's University, Kingston, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computing, Queen\u2019s University, Kingston, Canada","institution_ids":["https://openalex.org/I204722609"]},{"raw_affiliation_string":"School of Computing, Queen's University, Kingston, Canada","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055415812","display_name":"Talal Halabi","orcid":"https://orcid.org/0000-0002-1922-5803"},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Talal Halabi","raw_affiliation_strings":["School of Computing, Queen\u2019s University, Kingston, Canada","School of Computing, Queen's University, Kingston, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computing, Queen\u2019s University, Kingston, Canada","institution_ids":["https://openalex.org/I204722609"]},{"raw_affiliation_string":"School of Computing, Queen's University, Kingston, Canada","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005563986","display_name":"Mohammad Zulkernine","orcid":"https://orcid.org/0000-0003-1697-4101"},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohammad Zulkernine","raw_affiliation_strings":["School of Computing, Queen\u2019s University, Kingston, Canada","School of Computing, Queen's University, Kingston, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computing, Queen\u2019s University, Kingston, Canada","institution_ids":["https://openalex.org/I204722609"]},{"raw_affiliation_string":"School of Computing, Queen's University, Kingston, Canada","institution_ids":["https://openalex.org/I204722609"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5067219278"],"corresponding_institution_ids":["https://openalex.org/I204722609"],"apc_list":null,"apc_paid":null,"fwci":0.4769,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.67048549,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7741269469261169},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6965194344520569},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6925384402275085},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6060748100280762},{"id":"https://openalex.org/keywords/safer","display_name":"SAFER","score":0.55059814453125},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.51659095287323},{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.47717180848121643},{"id":"https://openalex.org/keywords/visibility","display_name":"Visibility","score":0.43963152170181274},{"id":"https://openalex.org/keywords/automotive-industry","display_name":"Automotive industry","score":0.4157443642616272},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3648608922958374},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17878654599189758},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.13467064499855042}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7741269469261169},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6965194344520569},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6925384402275085},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6060748100280762},{"id":"https://openalex.org/C2776654903","wikidata":"https://www.wikidata.org/wiki/Q2601463","display_name":"SAFER","level":2,"score":0.55059814453125},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.51659095287323},{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.47717180848121643},{"id":"https://openalex.org/C123403432","wikidata":"https://www.wikidata.org/wiki/Q654068","display_name":"Visibility","level":2,"score":0.43963152170181274},{"id":"https://openalex.org/C526921623","wikidata":"https://www.wikidata.org/wiki/Q190117","display_name":"Automotive industry","level":2,"score":0.4157443642616272},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3648608922958374},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17878654599189758},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.13467064499855042},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csnet47905.2019.9108923","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet47905.2019.9108923","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 3rd Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6600000262260437,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W170020907","https://openalex.org/W1520914943","https://openalex.org/W1793197839","https://openalex.org/W1967919565","https://openalex.org/W1985719683","https://openalex.org/W2041439392","https://openalex.org/W2080807290","https://openalex.org/W2096390187","https://openalex.org/W2128381560","https://openalex.org/W2150208758","https://openalex.org/W2165491783","https://openalex.org/W2612612909","https://openalex.org/W2749784422","https://openalex.org/W2762158083","https://openalex.org/W2794717503","https://openalex.org/W2800112063","https://openalex.org/W2884379941","https://openalex.org/W2894173894","https://openalex.org/W2897476383","https://openalex.org/W2913889054","https://openalex.org/W2962853362","https://openalex.org/W4231753281"],"related_works":["https://openalex.org/W2953205341","https://openalex.org/W2092643327","https://openalex.org/W2029935773","https://openalex.org/W235065745","https://openalex.org/W1572215850","https://openalex.org/W2787754950","https://openalex.org/W2352115286","https://openalex.org/W2412818166","https://openalex.org/W599377045","https://openalex.org/W2476350415"],"abstract_inverted_index":{"Automated":[0],"and":[1,29,36,103,157,171,188,216,233],"connected":[2,22,82,123],"vehicle":[3,41,176],"technologies":[4],"are":[5],"among":[6],"the":[7,30,45,101,107,131,136,175,185,201,205,208,220],"most":[8],"heavily":[9],"researched":[10],"automotive":[11],"technologies.":[12],"As":[13,161],"a":[14,65,72,88,118,141,146,162,178],"part":[15],"of":[16,86,90,207,222,229],"an":[17,127],"Intelligent":[18],"Transportation":[19],"System":[20],"(ITS),":[21],"vehicles":[23,91,124,209],"provide":[24,117,190],"useful":[25],"information":[26],"to":[27,32,49,97,99,110,130,150,203],"drivers":[28],"infrastructure":[31,183],"help":[33],"make":[34],"safer":[35],"more":[37,47,169],"informed":[38],"decisions.":[39,112],"However,":[40],"connectivity":[42],"has":[43],"made":[44],"ITS":[46],"vulnerable":[48],"security":[50,56,217],"attacks":[51],"that":[52,144],"can":[53,189],"endanger":[54],"vehicle's":[55],"as":[57,59,177],"well":[58],"driver's":[60],"safety.":[61],"Sybil":[62],"attack":[63],"is":[64,168,197],"very":[66],"common":[67],"attack,":[68],"considered":[69],"dangerous":[70],"in":[71,135,173,184,227],"distributed":[73,133],"network":[74,187],"with":[75,92],"no":[76],"centralized":[77,163],"authority.":[78],"When":[79],"launched":[80],"against":[81,125],"vehicles,":[83],"it":[84],"consists":[85],"controlling":[87],"set":[89],"forged":[93],"or":[94],"fake":[95],"identities":[96],"try":[98],"alter":[100],"measurements":[102],"data":[104],"collected":[105],"by":[106],"ITS,":[108],"leading":[109],"sub-optimal":[111],"In":[113],"this":[114,138],"paper,":[115],"we":[116],"cloud-based":[119,142,147,225],"detection":[120,230],"scheme":[121,202],"for":[122],"such":[126],"attack.":[128],"Contrary":[129],"previous":[132],"solutions":[134],"literature,":[137],"paper":[139],"presents":[140],"solution":[143,226],"integrates":[145],"authorization":[148],"unit":[149],"authenticate":[151],"legitimate":[152],"nodes":[153],"using":[154],"symmetric":[155],"cryptography":[156],"real-time":[158,191],"location":[159],"tracking.":[160],"authentication":[164],"system,":[165],"cloud":[166],"computing":[167],"reliable":[170],"secure":[172],"managing":[174],"device":[179],"than":[180],"any":[181],"other":[182],"vehicular":[186],"visibility.":[192],"A":[193],"trust":[194],"evaluation":[195],"approach":[196],"also":[198],"integrated":[199],"into":[200],"drive":[204],"decisions":[206],"concerning":[210],"potential":[211],"collaborations.":[212],"The":[213],"performed":[214],"experiment":[215],"analysis":[218],"show":[219],"efficacy":[221],"our":[223],"proposed":[224],"terms":[228],"rate,":[231],"complexity":[232],"system":[234],"requirements.":[235]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
