2020
DOI: 10.1007/s12652-020-02276-5
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED ARTICLE: Novel Sybil attack detection using RSSI and neighbour information to ensure secure communication in WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…The proposed method has a firm reliance on historical records, making this approach not stable and durable. Angappan, Sakthivel & Vishvaksenan (2020) proposed a localized scheme for Sybil node detection called NoSad using RSSI value and intra-cluster communication, which can be deployed to the device. However, NoSad is not stable when there are a minimum of two Sybil node and cannot cater to mobility in WSN.…”
Section: Survey Methodologymentioning
confidence: 99%
“…The proposed method has a firm reliance on historical records, making this approach not stable and durable. Angappan, Sakthivel & Vishvaksenan (2020) proposed a localized scheme for Sybil node detection called NoSad using RSSI value and intra-cluster communication, which can be deployed to the device. However, NoSad is not stable when there are a minimum of two Sybil node and cannot cater to mobility in WSN.…”
Section: Survey Methodologymentioning
confidence: 99%
“…For example, schemes such as Kabbur and Kumar [24] and Yuan et al [25] use RSS indication values obtained through triangulation, requiring at least three monitoring nodes to be used [12] [23]. Other examples include schemes like Lv et al [26], Abbas et al [27] and Angappan et al [28], which require the use of additional localization information such as those obtainable through neighbors of the suspicious nodes [12]; consequently, unlike schemes that purely and directly use intrinsically generated physical layer data, these schemes may be more susceptible to attacks involving information spoofing.…”
Section: B Sybil Attack Detection In Ioftmentioning
confidence: 99%
“…If a node finds a sybil neighbor node then the sensor node thinks that it is its nearest neighbors and chooses the sybil node as the next hop neighbor. This attack induces fake packets in the network and disrupts the functioning of the network [28]. − Flooding attack: In this attack the malicious node tries to flood the memory of the target node by sending connection request messages.…”
Section: Different Types Of Attacks In Wireless Sensor Network (Wsn)mentioning
confidence: 99%