Figure 11From: Detecting Sybil attacks in vehicular networksId. of RSU where attacker exhausts all Sybil pseudonyms. The point of pseudonym exhaustion under the Normal Dispersion Efficiency Attack scheme. As the percentage of Sybil pseudonyms increase, the longer it takes for that set to exhaust. In the worst case, all pseudonyms are used by the 6th RSU, showing comparable performance to the simple attack.Back to article page