2019
DOI: 10.1109/jiot.2018.2843769
|View full text |Cite
|
Sign up to set email alerts
|

Analytical Model for Sybil Attack Phases in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 78 publications
(21 citation statements)
references
References 27 publications
0
21
0
Order By: Relevance
“…To be able to design these defense machineries, knowledge is needed to recognize behavior and predict the possible actions of the Sybil attacker. Mishra (Mishra AK et al, 2019) classifies Sybil attacks based on nature and tasks carried out during this attack into three phases, namely, the compromise, deployment, and launch phases.…”
Section: Sybil Attack Propertiesmentioning
confidence: 99%
“…To be able to design these defense machineries, knowledge is needed to recognize behavior and predict the possible actions of the Sybil attacker. Mishra (Mishra AK et al, 2019) classifies Sybil attacks based on nature and tasks carried out during this attack into three phases, namely, the compromise, deployment, and launch phases.…”
Section: Sybil Attack Propertiesmentioning
confidence: 99%
“…However, this scheme might not work well on all circumstances as the measures depend on the Received Signal Strength Indicator (RSSI) values; however, a powerful attacker may bypass the scheme. A comprehensive study of the behavior of a Sybil attack has been offered in [149], which may help to formulate an effective countermeasure to defend IoT from such attacks. Authors defined the defense mechanisms as Behavior Classification-Based Sybil Detection (BCSD), Mobile Sybil Detection (MSD), and Social Graph-Based Sybil Detection (SGSD) [116] to defend against such attack in IoT.…”
Section: B Autonomic Approachesmentioning
confidence: 99%
“…To avoid the Sybil attack effects, defense mechanisms that can detect Sybil attacks accurately are needed. Mishra [1] classifies Sybil attacks based on nature and tasks carried out during this attack into three phases, namely the compromise, deployment, and launch phases. This property is significant to be considered in the design of defense mechanisms so that these defense mechanisms can recognize behavior and predict the likelihood of the actions of Sybil attackers appropriately.…”
Section: Sybil Attack Defense Mechanismmentioning
confidence: 99%
“…So this research was conducted to solve several problems related to Vanet that are still an open problem, including as follows. Accuracy issue is that the defense mechanism can detect Sybil at each phase, and it must be able to discover the large percentage of Sybil nodes in any properties [1]. Privacy issue is that most vehicle users hope that their identity information can be stored in VANET because they are afraid that their trip will leak with that identity [2].…”
Section: Introductionmentioning
confidence: 99%