2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) 2017
DOI: 10.1109/icacci.2017.8126193
|View full text |Cite
|
Sign up to set email alerts
|

Sybil attack in IOT: Modelling and defenses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 48 publications
(23 citation statements)
references
References 10 publications
0
21
0
2
Order By: Relevance
“…Modifying the routing information, so called modifying attack, is the easiest form of routing attacks. Besides these attacks, many attacks have been found in literature, the most common of which are Sybil [139], Gray Hole [140], Wormhole, Hello flood, and Selective forwarding. Next, We briefly illustrate them.…”
Section: Attacks and Threats Against Communication Levelmentioning
confidence: 99%
“…Modifying the routing information, so called modifying attack, is the easiest form of routing attacks. Besides these attacks, many attacks have been found in literature, the most common of which are Sybil [139], Gray Hole [140], Wormhole, Hello flood, and Selective forwarding. Next, We briefly illustrate them.…”
Section: Attacks and Threats Against Communication Levelmentioning
confidence: 99%
“…An adversary scriptA can physically seize some IoT sensors as the sensors are deployed in an “unattended (hostile) environment” whereas 24 × 7 monitoring is not possible, and hence, it allows scriptA to extract the useful information (for example, session keys established with other IoT sensor) from their memory using the power analysis attack scriptA can install malicious program in the memory of sensing devices to perform other attacks (ie, routing attacks) scriptA can also deploy some attacker nodes to capture the exchanging confidential data of IoT sensors.…”
Section: Introductionmentioning
confidence: 99%
“…If these attacker nodes are present, the information may not reach to the destination within a specific time. Moreover, information may be lost or modified, which may also create more energy disbursement …”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations