2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications 2013
DOI: 10.1109/trustcom.2013.39
|View full text |Cite
|
Sign up to set email alerts
|

A Regional Statistics Detection Scheme against Sybil Attacks in WSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…When the wide simulation is being done, it revealed that LSDF with few evidences can perceive the SYBIL attack action accurately. Makhdoom [24] et al it gives a detailed review and analysis on the several defenses which was proposed against SYBIL attack. As the author know the weakness and strength and it gives a novel "One Way Code Attestation Protocol (OWCAP)" for wireless sensor networks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…When the wide simulation is being done, it revealed that LSDF with few evidences can perceive the SYBIL attack action accurately. Makhdoom [24] et al it gives a detailed review and analysis on the several defenses which was proposed against SYBIL attack. As the author know the weakness and strength and it gives a novel "One Way Code Attestation Protocol (OWCAP)" for wireless sensor networks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Sun [7] et al have proposed a regional statistics detection scheme (RSDs) against sybil attacks, which is an effective solution to three key issues: firstly, the authors have addressed the sybil attack by a RSSI-based distributed detection mechanism, secondly, their protocol can prevented the network from a large number of nodes failure caused by sybil attacks, Thirdly, the RSDs has been verified can maintain a high detection probability with low system overhead by implement experiments. Finally, the authors run their protocol in a prototype detection system with 32 nodes that the experiment result confirmed its high efficiency.…”
Section: Sybil Attackmentioning
confidence: 99%
“…Case in point, an aggressor may smother a blockage cautioning, and use it in an alternate time, so vehicles won't get the cautioning and compelled to hold up in the activity [13].…”
Section: Message Suppression Attackmentioning
confidence: 99%
“…Every hub send messages with various characters, thusly different hubs understand that there are numerous hubs in the system in the meantime. This assault is extremely unsafe on the grounds that a one hub can issue its different areas in the meantime and this making security hazard [17].…”
Section: Sybil Attackmentioning
confidence: 99%