“…Furthermore, as stated in [6], in the attack model, it is assumed that the network is insecure and that the nodes could be captured with a certain probability. Also, our attack model assumes that the adversary does not employ external powerful devices to lunch Sybil attacks, as it is assumed in many existing papers [6,9,10,11,15,[17][18][19]. Like [6,9,10,11,15,[17][18][19], it is assumed that M (M < N) legitimate nodes of the network can be captured by an adversary and reprogrammed to establish a Sybil attack.…”