2014 International Conference on Science Engineering and Management Research (ICSEMR) 2014
DOI: 10.1109/icsemr.2014.7043659
|View full text |Cite
|
Sign up to set email alerts
|

Safety concerns of Sybil attack in WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Dalfiah [19] et al proposed the energy efficient integration of IDS (intrusion detection system) which detect the network layer SYBIL attack. In this it spots the node accurately and eliminates the false node which is behaving like an original node.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Dalfiah [19] et al proposed the energy efficient integration of IDS (intrusion detection system) which detect the network layer SYBIL attack. In this it spots the node accurately and eliminates the false node which is behaving like an original node.…”
Section: Literature Reviewmentioning
confidence: 99%
“…J. Dalfiah [31] et al propose the integration of efficient energy in meddling recognition system that discover the Sybil attack in network layer. In this he spots the node accuracy and elimination of false node which behaves like an original node.…”
mentioning
confidence: 99%