2021
DOI: 10.3390/s21093257
|View full text |Cite
|
Sign up to set email alerts
|

Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc Networks

Abstract: Today, increasing Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks that are deployed in scenarios with irregular or unreliable Internet connectivity. The lack of a central authority that can be contacted at any time allows attackers to introduce arbitrary amounts of nodes into the ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 53 publications
0
8
0
Order By: Relevance
“…Leiding et al [19,20] first formalized the Authcoin protocol [21] using CPNs and subsequently performed a risk and threat analysis using the ISSRM domain model [22] before mitigating identified risks using security risk-oriented patterns (SRPs) [23,24]. Finally, Bochem and Leiding [36] used CPNs to verify various properties of the blockchain-based Rechained protocol formally.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Leiding et al [19,20] first formalized the Authcoin protocol [21] using CPNs and subsequently performed a risk and threat analysis using the ISSRM domain model [22] before mitigating identified risks using security risk-oriented patterns (SRPs) [23,24]. Finally, Bochem and Leiding [36] used CPNs to verify various properties of the blockchain-based Rechained protocol formally.…”
Section: Related Workmentioning
confidence: 99%
“…CPN-ML is an expression programming language for inscriptions which are used to further specify data types and operations of the modeled system. CPN tokens and their colors represent the different data types of the modeled system" [36].…”
Section: Modeling the Blockvoke Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…Chapter 3 cites the paper titled "Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad hoc Networks" by Arne Bochem and Benjamin Leiding of the Institute of Computer Science, Telematics Group, University of Goettingen, Germany (e-mail: {bochem,benjamin.leiding}@informatik.uni-goettingen.de) [20] verbatim, except for formatting and handling of acronyms and Section 3.8. It was published in the open-access MDPI Sensors journal under the Creative Commons CC BY 4.0 license, permitting use in this thesis, as long as attribution, such as this, is provided.…”
Section: Copyright and Contributionmentioning
confidence: 99%