2014
DOI: 10.1007/978-3-662-45174-8_16
|View full text |Cite
|
Sign up to set email alerts
|

Who Are You? Secure Identities in Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…Resource Testing. Resource testing requires a prover to demonstrate utilization of a radio channel [55,56,101]. 3 Consider a wireless setting where each device has a single radio that provides access to one of several channels.…”
Section: Proof-of-work (Pow)mentioning
confidence: 99%
“…Resource Testing. Resource testing requires a prover to demonstrate utilization of a radio channel [55,56,101]. 3 Consider a wireless setting where each device has a single radio that provides access to one of several channels.…”
Section: Proof-of-work (Pow)mentioning
confidence: 99%
“…While PoW-based defenses work in general network settings, domain-specific results for mitigating the Sybil attack have been discovered. In a wireless network with multiple communication channels, Sybil attacks can be mitigated via radio-resource testing which relies on the inability of the adversary to listen to many channels simultaneously [17,18,37]. However, this approach may fail if the adversary can monitor most or all of the channels.…”
Section: Related Workmentioning
confidence: 99%
“…Radio-Resource Testing. In a wireless network with multiple communication channels, Sybil attacks can be mitigated via radio-resource testing which relies on the inability of the adversary to listen to many channels simultaneously [26,27,51]. However, this approach may fail if the adversary can monitor most or all of the channels.…”
Section: Sybil Attackmentioning
confidence: 99%