2021
DOI: 10.36909/jer.v9i2.8837
|View full text |Cite
|
Sign up to set email alerts
|

Innovative survey of defense machinery against Sybil attacks over wireless ad hoc network on IoT

Abstract: Integrating IoT with Wireless Ad hoc Network (WANET) capabilities can solve several problems. However, because they both rely on identity nodes to communicate with each other, they are both vulnerable to Sybil attacks. Sybil attackers illegally change into several different identities (attackers) to carry out various malicious activities such as damaging data aggregation, voting, and disrupting routing. Several defense machineries have been proposed for Sybil attacks on WANET, which are mostly based on cryptog… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 45 publications
0
3
0
Order By: Relevance
“…There are quite a number of published articles that outline different Sybil attack detection methods that are applicable to slightly different IoT domains; several recent survey papers summarize these into their associated categories. Recent surveys on Sybil attack detection in wireless ad hoc networks and wireless sensor networks can be found in Arshad et al [12], Vasudeva and Sood [18], and Singh [19]. There are also several recent survey papers on Sybil attack detection in VANETs, including Shobana and Arockia [20], Zhang et al [21], Velayudhan and Anitha [22], and Hammi et al [23].…”
Section: B Sybil Attack Detection In Ioftmentioning
confidence: 99%
See 2 more Smart Citations
“…There are quite a number of published articles that outline different Sybil attack detection methods that are applicable to slightly different IoT domains; several recent survey papers summarize these into their associated categories. Recent surveys on Sybil attack detection in wireless ad hoc networks and wireless sensor networks can be found in Arshad et al [12], Vasudeva and Sood [18], and Singh [19]. There are also several recent survey papers on Sybil attack detection in VANETs, including Shobana and Arockia [20], Zhang et al [21], Velayudhan and Anitha [22], and Hammi et al [23].…”
Section: B Sybil Attack Detection In Ioftmentioning
confidence: 99%
“…In the range-free methods, high accuracy location is calculated based on data supplied through external means, such as Global Positioning System (GPS), radar or other localization schemes. The range-based methods, however, generally can work simply by using data obtainable from the physical layer characteristics of the radio signals being sent and received [19]. There are several reasons why methods that use intrinsically generated physical layer data to detect Sybil attack might be more preferable than others.…”
Section: B Sybil Attack Detection In Ioftmentioning
confidence: 99%
See 1 more Smart Citation