A SURVEY ON SYBIL ATTACK AND DETECTION FOR SECURITY

Sri Vasavi College, Erode Self-Finance Wing 3rd February 2017 National Conference on Computer and Communication NCCC’17

Format: Volume 5, Issue 1, No 13, 2017

Copyright: All Rights Reserved ©2017

Year of Publication: 2017

Author: K.Girija,K.S.Saravanan

Reference:IJCS-218

View PDF Format

Abstract

Wireless sensor networks constitute of sensor nodes which are small in size, running on battery, limited computation power. we investigate, Sybil attack which is a node illegitimately asserts numerous characters and acquires multiple identities and perfor

References

[1] Yingying chen, “Detecting and localizing identity-based attacks in wireless sensor network”,IEEE Journal, June 2010. [2] Shaohe Lv, “Detecting the Sybil attack cooperatively in wireless sensor networks”, IEEE Conference, June 2008 [3] Dr. Manoj Kumar Jain, “Wireless Sensor Networks: Security Issues and Challenges”, IJCIT,2011. [4] Y.Zhou, Y.Fang, Y.Zhang, “Security Wireless Sensor Networks: A Survey”, IEEE Communication Surveys, Vol.10, No.3, 3rd Quarter2008. [5] J. Newsome, E. Shi, D. Song and A. Perrig. “The Sybil Attack in Sensor Network: Analysis & Defenses”. In IPSN’04 [6] Karen Hsu, “Security Analysis on Defenses against Sybil Attacks in Wireless Sensor networks”IEEE Journal, 2008. [7] M. Demirbasand Y. Song. ,”An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks”, IEEE Journal,2006. [8] WEN Mi,LI Hui, ZHENG Yan-fei, CHEN Ke-fei, “TDOA-based Sybil attack detection scheme for wireless sensor network”,IEEEJournal 2006.


Keywords

Sensor network, Sybil attack, RSSI, TDOA,CRSD

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog