2015 IEEE Trustcom/BigDataSE/Ispa 2015
DOI: 10.1109/trustcom.2015.390
|View full text |Cite
|
Sign up to set email alerts
|

A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network

Abstract: Wireless Sensor Networks (WSNs) have experienced phenomenal growth over the past decade. They are typically deployed in remote and hostile environments for monitoring applications and data collection. Miniature sensor nodes collaborate with each other to provide information on an unprecedented temporal and spatial scale. The resource-constrained nature of sensor nodes along with human-inaccessible terrains poses various security challenges to these networks at different layers. In this paper, we propose a nove… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
48
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 62 publications
(48 citation statements)
references
References 23 publications
0
48
0
Order By: Relevance
“…Among them is Sybil attack where an adversary forges multiple identities at a given time to mislead legitimate nodes into believing that they are having many neighbours [21].…”
Section: Related Workmentioning
confidence: 99%
“…Among them is Sybil attack where an adversary forges multiple identities at a given time to mislead legitimate nodes into believing that they are having many neighbours [21].…”
Section: Related Workmentioning
confidence: 99%
“…In this case, energy of each cluster head will be exhausted rapidly in the aforementioned resource‐intensive operations. A large value of k opt will make a cluster‐based hierarchical network rather inefficient and ineffective because of low data aggregation and fusion …”
Section: Pawn: Payload‐based Authentication For Wsnmentioning
confidence: 99%
“…Lee et al analyzed the behavior of various attacks, such as continuous election as cluster head, TDMA schedule obedience, aborting and/or no transmission of member/cluster head data, and transmission of powerful signals. Jan et al investigated the behavior of Sybil nodes in cluster‐based hierarchical routing protocols. They studied the impact and consequences of Sybil nodes performing the role of cluster heads in these networks.…”
Section: Introductionmentioning
confidence: 99%
“…It has possible two values, Yes if used, No if not used. This criterion is very important because through this we can find out the use of tools in the description of the non-functional requirements [34][35][36]. The evaluation criteria discussed above are listed in a table 1 to illustrate thoroughly in order to comprehend the discussion based on these criteria.…”
Section: Frameworkmentioning
confidence: 99%