2021
DOI: 10.7717/peerj-cs.673
|View full text |Cite
|
Sign up to set email alerts
|

A survey of Sybil attack countermeasures in IoT-based wireless sensor networks

Abstract: Wireless sensor networks (WSN) have been among the most prevalent wireless innovations over the years exciting new Internet of Things (IoT) applications. IoT based WSN integrated with Internet Protocol IP allows any physical objects with sensors to be connected ubiquitously and send real-time data to the server connected to the Internet gate. Security in WSN remains an ongoing research trend that falls under the IoT paradigm. A WSN node deployed in a hostile environment is likely to open security attacks such … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 27 publications
(12 citation statements)
references
References 110 publications
0
12
0
Order By: Relevance
“…There are quite a number of published articles that outline different Sybil attack detection methods that are applicable to slightly different IoT domains; several recent survey papers summarize these into their associated categories. Recent surveys on Sybil attack detection in wireless ad hoc networks and wireless sensor networks can be found in Arshad et al [12], Vasudeva and Sood [18], and Singh [19]. There are also several recent survey papers on Sybil attack detection in VANETs, including Shobana and Arockia [20], Zhang et al [21], Velayudhan and Anitha [22], and Hammi et al [23].…”
Section: B Sybil Attack Detection In Ioftmentioning
confidence: 99%
See 1 more Smart Citation
“…There are quite a number of published articles that outline different Sybil attack detection methods that are applicable to slightly different IoT domains; several recent survey papers summarize these into their associated categories. Recent surveys on Sybil attack detection in wireless ad hoc networks and wireless sensor networks can be found in Arshad et al [12], Vasudeva and Sood [18], and Singh [19]. There are also several recent survey papers on Sybil attack detection in VANETs, including Shobana and Arockia [20], Zhang et al [21], Velayudhan and Anitha [22], and Hammi et al [23].…”
Section: B Sybil Attack Detection In Ioftmentioning
confidence: 99%
“…Detection refers to the identification of security breach, the identification of attack type, as well as the initiation of relevant mitigation solutions. Finally, mitigation refers to the alleviation of resulting outcomes of the attack [12].…”
Section: Introductionmentioning
confidence: 99%
“…In Wireless Sensor Network (WSN) , it is important to identify any mobility gaps and implement an efficient model to maintain network quality and lifetime in a disaster/earthquake, battlefield surveillance, and law enforcement situations 1 . Similarly, in the WSN network, Sybil attacks and their types have been discussed along with the countermeasures in such an environment where the node identifiers or the location can be eavesdropped, modified and masqueraded with today's engineering progress 2 . Therefore, to achieve robust cryptography techniques like lattice cryptography, authors surveyed 3 post‐quantum cryptosystems in an Internet of Things (IoT) environment.…”
Section: Introductionmentioning
confidence: 99%
“…Previously, extensive research methods have been discussed, surveyed, and implemented to restrict Man‐In‐The‐Middle (MITM) and Sybil attacks. There are some strategies or combinations of strategies namely, single and hybrid to prevent, detect and mitigate the Sybil attack 2 and the possible challenges and solutions to prevent MITM attack 4 in an IoT environment using quantum‐based lattice key exchange technique. Apart from offering secure data communication, various hidden metrics should also be considered, which may or may not be directly involved in the implementation of a security scheme.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation