2009
DOI: 10.1016/j.comnet.2009.07.013
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Sybil attacks in Wireless Sensor Networks using neighboring information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
56
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 105 publications
(84 citation statements)
references
References 14 publications
0
56
0
Order By: Relevance
“…Figure 5 indicates the experiment results for time periods 25 to 200 during the test phase. The experiment results prove that network nodes number (n) has no significant effect on detection rate of the proposed algorithm because, unlike other algorithms, such the one developed in [9], the proposed algorithm is not based on network density but on confrontation of malicious and legitimate nodes, the identities of which is captured by the enemy, in the vicinity of sink nodes. Therefore, increase or decrease of the number of nodes in the network leaves no effect on detection rate of the proposed algorithm.…”
Section: Detection Rate (%)mentioning
confidence: 82%
See 2 more Smart Citations
“…Figure 5 indicates the experiment results for time periods 25 to 200 during the test phase. The experiment results prove that network nodes number (n) has no significant effect on detection rate of the proposed algorithm because, unlike other algorithms, such the one developed in [9], the proposed algorithm is not based on network density but on confrontation of malicious and legitimate nodes, the identities of which is captured by the enemy, in the vicinity of sink nodes. Therefore, increase or decrease of the number of nodes in the network leaves no effect on detection rate of the proposed algorithm.…”
Section: Detection Rate (%)mentioning
confidence: 82%
“…the amount of Sybil nodes detected by a security algorithm. What is more, the proposed algorithm performance is compared with those given in [8][9][10]13,14,16], in terms of average detection rate and average rate of error.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…One of the techniques under non-location-based category, as far as we could identify, is the Radio resource testing [6]. The techniques under the upper-layers-based category are further divided to neighborhood-based [7,8], code attestation-based [9][10][11], authentication-based (puzzle solving technique [12] for peer-to-peer networks, Identity certificate technique [13]), and identity registration-based [14]. Figure 1 illustrates the Sybil attack detection techniques categorization.…”
Section: Introductionmentioning
confidence: 99%
“…Ssu et al [23] proposed a scheme based on the assumption that probability of two nodes having exactly the same set of neighbours was extremely low provided that a network had a high node density. They argued that forged identities typically had the same set of neighbours because they were all associated with the same physical device.…”
Section: Related Workmentioning
confidence: 99%