2015
DOI: 10.1109/tmc.2015.2398425
|View full text |Cite
|
Sign up to set email alerts
|

The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities

Abstract: Wireless networks are vulnerable to Sybil attacks, in which a malicious node poses as many identities in order to gain disproportionate influence. Many defenses based on spatial variability of wireless channels exist, but depend either on detailed, multi-tap channel estimation-something not exposed on commodity 802.11 devices-or valid RSSI observations from multiple trusted sources, e.g., corporate access points-something not directly available in ad hoc and delay-tolerant networks with potentially malicious n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(19 citation statements)
references
References 22 publications
(45 reference statements)
0
19
0
Order By: Relevance
“…An alternative defense is to use measurements of communication latency or wireless signal strength to verify the uniqueness of IDs [26,38,53,91,140]. However, these techniques are sensitive to measurement accuracy.…”
Section: Distributed Hash Tablesmentioning
confidence: 99%
“…An alternative defense is to use measurements of communication latency or wireless signal strength to verify the uniqueness of IDs [26,38,53,91,140]. However, these techniques are sensitive to measurement accuracy.…”
Section: Distributed Hash Tablesmentioning
confidence: 99%
“…However, this method does not detect when the attack node is close to the physical vehicle. The work in [36] adds multiple detection nodes to collect the RSSI of the vehicle to determine whether it is consistent with the beacon node. Feng, X. et al [37] used an event-based reputation system to defend against Sybil attacks.…”
Section: Related Workmentioning
confidence: 99%
“…For example, [24] provides an iterative trust management mechanism to fight against Byzantine attacks in which several nodes are totally controlled by the adversary. In [25], a defense against Sybil attacks [26] is introduced, which is based on the physical feature of the wireless propagation channel. A trust model in the scenario of underwater acoustic sensor networks is presented in [27] to take into account several trust metrics such as link trust, data trust, and node trust.…”
Section: Related Workmentioning
confidence: 99%