2022
DOI: 10.1007/s12652-022-04070-x
|View full text |Cite
|
Sign up to set email alerts
|

Retraction Note to: Novel Sybil attack detection using RSSI and neighbour information to ensure secure communication in WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(31 citation statements)
references
References 0 publications
0
31
0
Order By: Relevance
“…The TDR of DTMS is 2.2% and 1.14% greater than [3] and NoSad [4], respectively in the presence of 2 SaN. Moreover, the TDR of DTMS is 3.3% and 1.1% greater than [3] and NoSad [4], respectively, in the presence of 3 SaN. Furthermore, the TDR of DTMS is 0.1% and .01% greater than [3] and NoSad [4], respectively, in the presence of 7 SaNs.…”
Section: I) Severity Analysismentioning
confidence: 84%
See 3 more Smart Citations
“…The TDR of DTMS is 2.2% and 1.14% greater than [3] and NoSad [4], respectively in the presence of 2 SaN. Moreover, the TDR of DTMS is 3.3% and 1.1% greater than [3] and NoSad [4], respectively, in the presence of 3 SaN. Furthermore, the TDR of DTMS is 0.1% and .01% greater than [3] and NoSad [4], respectively, in the presence of 7 SaNs.…”
Section: I) Severity Analysismentioning
confidence: 84%
“…Hence TDR increases and FDR decreases. The TDR of DTMS is 2.2% and 1.14% greater than [3] and NoSad [4], respectively in the presence of 2 SaN. Moreover, the TDR of DTMS is 3.3% and 1.1% greater than [3] and NoSad [4], respectively, in the presence of 3 SaN.…”
Section: I) Severity Analysismentioning
confidence: 87%
See 2 more Smart Citations
“…Also, the enemy is actively engaged in eavesdropping by being present in all parts of the mobile sensor network [32] [33]. The enemy is able to identify the location of all radio communications at the location of the network [34]. While the enemy monitors the traffic, we assume that the cryptographic system is robust enough so that the enemy cannot use the cryptographic system analysis to retrieve the contents of the body or header.…”
Section: B-problem Formulationmentioning
confidence: 99%