Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks 2004
DOI: 10.1145/984622.984660
|View full text |Cite
|
Sign up to set email alerts
|

The sybil attack in sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
719
0
9

Year Published

2007
2007
2017
2017

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 1,144 publications
(728 citation statements)
references
References 15 publications
0
719
0
9
Order By: Relevance
“…creates a large number of virtual nodes in order to collect all traffic in a certain area [23]. Additionally, vehicle speed could be taken into consideration because higher vehicle speeds usually result in lower node densities.…”
Section: Maximum Density Threshold (Mdt)mentioning
confidence: 99%
“…creates a large number of virtual nodes in order to collect all traffic in a certain area [23]. Additionally, vehicle speed could be taken into consideration because higher vehicle speeds usually result in lower node densities.…”
Section: Maximum Density Threshold (Mdt)mentioning
confidence: 99%
“…Security under typical attacks: In sybil attacks [9], an adversary tries to clone sensor nodes with different IDs. Since the keying materials for pairwise key establishment are always tied to the node ID, our approach is free from sybil attacks.…”
Section: E Discussionmentioning
confidence: 99%
“…Second, since the wireless channel is essentially a broadcast channel, an attacker can easily eavesdrop, corrupt, forge, or replay any message in such communication channel. This will lead to many attacks such as DoS attacks [8], Sybil attacks [9], and Wormhole attacks [10]. Third, an adversary can easily capture a sensor node and quickly learn all the secrets inside [11].…”
Section: Introductionmentioning
confidence: 99%
“…In the Sybil attack (Newsome et al, 2004) a single node or nodes may impersonate a large number of different nodes thereby taking over a whole network of sensors. In all cases, attestation is a key defence against these attacks.…”
Section: B4: Network Authenticationmentioning
confidence: 99%