2010
DOI: 10.1002/sec.197
|View full text |Cite
|
Sign up to set email alerts
|

Defending Sybil attacks based on neighboring relations in wireless sensor networks

Abstract: As the prevalence of Wireless Sensor Networks (WSNs) grows in the military and civil domains, network security becomes an evermore critical concern. In Sybil attack, malicious nodes forge a lot of fake identities to disrupt the network's protocols. Previous work used either authentication-based mechanisms which use shared encryption keys, or location information to verify the identities of the nodes. By contrast, this paper uses only neighboring node relation to verify the node identities. The evaluation resul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…The Sybil conspiracy attack in Vehicle Ad hoc Network (VANET) was first introduced in , where the attacker could pretend to be a conspiracy node, and then his identity is to send malicious messages to other nodes nearby. Liu R et al, 2014, Jan MA et al, 2018, Demirbas M et al, 2006, Wang J et al, 2008, Bhuvaneshwari G et al, 2014, Lv S et al, 2008, Faisal M et al, 2018, Yao Y et al, 2019 Time-based ToA / TDoA Huang X et al, 2012, Garg N et al, 2014, Rajesh M et al, 2012 TDMA Spider Monkey Ali Alheeti KM et al, 2018, Iwendi C et al, 2018 Time Synchronization , Dong W et al, 2015, Benzaid C et al, 2011 Range free Geetha C et al, 2015, Shi W et al, 2015, Ayaida M et al, 2019, Patil DS et al, 2017, Grover J et al, 2010, Karuppiah AB et al, 2014, Tian B et al, 2013 Network Feature/ Behavior Traffic and Mobility Han S et al, 2017, Golestani Najafabadi S et al, 2013 Enter -Exit Behavior Attack Edge Jamshidi M et al, 2018, Silawan T et al, 2016 Node relation (Graph) Subba B et al, 2018, Zhang K et al, 2014, Sicari S et al, 2017 Network/physical data Singh R et al, 2017, Sujatha V et al, 2017, Wang H et al, 2018, Gantsou D et al, 2015 Gaikwad V et al, 2017, Sinha S. et al, 2013, Saggi MK et al, 2015, Danev B et al, 2009…”
Section: Launching Phasementioning
confidence: 99%
“…The Sybil conspiracy attack in Vehicle Ad hoc Network (VANET) was first introduced in , where the attacker could pretend to be a conspiracy node, and then his identity is to send malicious messages to other nodes nearby. Liu R et al, 2014, Jan MA et al, 2018, Demirbas M et al, 2006, Wang J et al, 2008, Bhuvaneshwari G et al, 2014, Lv S et al, 2008, Faisal M et al, 2018, Yao Y et al, 2019 Time-based ToA / TDoA Huang X et al, 2012, Garg N et al, 2014, Rajesh M et al, 2012 TDMA Spider Monkey Ali Alheeti KM et al, 2018, Iwendi C et al, 2018 Time Synchronization , Dong W et al, 2015, Benzaid C et al, 2011 Range free Geetha C et al, 2015, Shi W et al, 2015, Ayaida M et al, 2019, Patil DS et al, 2017, Grover J et al, 2010, Karuppiah AB et al, 2014, Tian B et al, 2013 Network Feature/ Behavior Traffic and Mobility Han S et al, 2017, Golestani Najafabadi S et al, 2013 Enter -Exit Behavior Attack Edge Jamshidi M et al, 2018, Silawan T et al, 2016 Node relation (Graph) Subba B et al, 2018, Zhang K et al, 2014, Sicari S et al, 2017 Network/physical data Singh R et al, 2017, Sujatha V et al, 2017, Wang H et al, 2018, Gantsou D et al, 2015 Gaikwad V et al, 2017, Sinha S. et al, 2013, Saggi MK et al, 2015, Danev B et al, 2009…”
Section: Launching Phasementioning
confidence: 99%