KeyChallenge: A Novel Sybil Attack Mitigation Technique Based on Cryptographic Key Generation
Abstract
References
Index Terms
- KeyChallenge: A Novel Sybil Attack Mitigation Technique Based on Cryptographic Key Generation
Recommendations
The sybil attack in sensor networks: analysis & defenses
IPSN '04: Proceedings of the 3rd international symposium on Information processing in sensor networksSecurity is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node illegitimately claims multiple identities. This paper systematically analyzes the ...
Game Theoretical Defense Mechanism Against Reputation Based Sybil Attacks
AbstractReputation mechanisms of a network or p2p applications can be compromised by a large number of fake or stolen identities recommending higher trust values of a malicious node. A high trust value classify such malicious or selfish nodes as ...
A sybil attack detection approach using neighboring vehicles in VANET
SIN '11: Proceedings of the 4th international conference on Security of information and networksVehicular Ad Hoc Network (VANET) is vulnerable to many security threats. One severe attack is Sybil attack, in which a malicious node forges a large number of fake identities in order to disrupt the proper functioning of VANET applications. In this ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 6Total Downloads
- Downloads (Last 12 months)6
- Downloads (Last 6 weeks)4
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format