Skip to main content

Advertisement

Figure 11 | Journal of Trust Management

Figure 11

From: Detecting Sybil attacks in vehicular networks

Figure 11

Id. of RSU where attacker exhausts all Sybil pseudonyms. The point of pseudonym exhaustion under the Normal Dispersion Efficiency Attack scheme. As the percentage of Sybil pseudonyms increase, the longer it takes for that set to exhaust. In the worst case, all pseudonyms are used by the 6th RSU, showing comparable performance to the simple attack.

Back to article page