Sybil attack in IOT: Modelling and defenses
暂无分享,去创建一个
[1] Hannes Hartenstein,et al. Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[2] Li Gao,et al. Grey theory based reputation system for secure neighbor discovery in wireless ad hoc networks , 2010, 2010 2nd International Conference on Future Computer and Communication.
[3] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[4] Ji Guo,et al. A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad Hoc Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[5] Bharat Jayaraman,et al. Sybil Attack Detection in Vehicular Networks , 2016, IoT 2016.
[6] J. Jithin,et al. Sybil defense mechanisms: A survey , 2015 .
[7] M. V. Ramesh,et al. Wireless Sensor Network Security: Real-Time Detection and Prevention of Attacks , 2012, 2012 Fourth International Conference on Computational Intelligence and Communication Networks.
[8] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[9] Ali Mahani,et al. Sybil attack Detection: Improving security of WSNs for smart power grid application , 2013, 2013 Smart Grid Conference (SGC).
[10] Sriram Sankaran,et al. Modeling and analysis of routing in IoT networks , 2015, 2015 International Conference on Computing and Network Communications (CoCoNet).
[11] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[12] Mahdiyeh Alimohammadi,et al. Sybil Attack Detection in Vehicular Networks , 2014 .