2008
DOI: 10.1109/icact.2008.4493936
|View full text |Cite
|
Sign up to set email alerts
|

An Approach to Mitigating Sybil Attack in Wireless Networks using ZigBee

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…Among them, we focus on the mesh topology in this paper. In ZigBee has the network is controlled by the ZigBee coordinator which is responsible for initiating and maintaining the devices on the network [8].IEEE 802.15.4 there is the foundation for zigbee network stack architecture that's why it directly use PHY and MAC layer for 802.15.4 standard [8]. ZigBee routers usually employed to extend size of network.…”
Section: A Zigbee Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Among them, we focus on the mesh topology in this paper. In ZigBee has the network is controlled by the ZigBee coordinator which is responsible for initiating and maintaining the devices on the network [8].IEEE 802.15.4 there is the foundation for zigbee network stack architecture that's why it directly use PHY and MAC layer for 802.15.4 standard [8]. ZigBee routers usually employed to extend size of network.…”
Section: A Zigbee Networkmentioning
confidence: 99%
“…ZigBee coordinators able to become the trust center. A device trusts its TC to identify the device that configure and manage the network [8].…”
Section: A Zigbee Networkmentioning
confidence: 99%
“…This kind of attack enables hackers to influence routing, information exchange, etc. by generating multiple legal messages having different sources by one node with virtually multiple identities in the network [3]. In special situations, this kind of attack can be detected in WSNs as Lee et al have shown in [3] by a method based on a challenge-response approach for tree-based sensor topologies.…”
Section: Introductionmentioning
confidence: 96%
“…by generating multiple legal messages having different sources by one node with virtually multiple identities in the network [3]. In special situations, this kind of attack can be detected in WSNs as Lee et al have shown in [3] by a method based on a challenge-response approach for tree-based sensor topologies. Nevertheless, a common IDS for WSNs is not part of any commercial communication standard used in WSNs like ZigBee or Bluetooth.…”
Section: Introductionmentioning
confidence: 96%
“…The aim of this attack is to convince the other devices that the malicious node is a legitimate node. In this way, a malicious node may, for example, access all services of the network or identify itself as a ZigBee router [33]. Another type of attack is performed if the enemy can physically access a ZigBee device.…”
Section: Related Workmentioning
confidence: 99%