Efficient Approaches to Mitigate the Effect of Sybil Attack in MANET for High Network Lifetime: A review
暂无分享,去创建一个
[1] Dieter Hogrefe,et al. Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks , 2018, IEEE Access.
[2] Konstantin Beznosov,et al. Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs , 2015, NDSS.
[3] Shehnaz T. Patel,et al. A review: Sybil attack detection techniques in WSN , 2017, 2017 4th International Conference on Electronics and Communication Systems (ICECS).
[4] Takahiro HARA,et al. Data management issues in mobile ad hoc networks , 2017, Proceedings of the Japan Academy. Series B, Physical and biological sciences.
[5] Issa M. Khalil,et al. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure , 2011, IEEE Transactions on Mobile Computing.
[6] R. S. Bhuvaneswaran,et al. DETECTION AND PREVENTION OF SYBIL ATTACK IN WIRELESS SENSOR NETWORK EMPLOYING RANDOM PASSWORD COMPARISON METHOD , 2014 .
[7] R. Sivakami,et al. A Radical Block to Byzantine Attacks in Mobile Ad Hoc Networks , 2016, Wirel. Pers. Commun..
[8] Larry J. Greenstein,et al. Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.
[9] Shailesh D. Kamble,et al. Detection and Mitigation of Sybil Attack in Peer-to-peer Network , 2016 .
[10] Abdelkamel Tari,et al. Secure and reliable certificate chains recovery protocol for mobile ad hoc networks , 2016, J. Netw. Comput. Appl..
[11] Mohsen Guizani,et al. Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[12] Mohini Kumrawat,et al. Optimizing energy consumption in wireless sensor network through distributed weighted clustering algorithm , 2015, 2015 International Conference on Computer, Communication and Control (IC4).
[13] J. I. Sheeba,et al. Identification of Sybil Attack on Social Networks , 2016 .
[14] Prateek Mittal,et al. SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection , 2013, IEEE Transactions on Information Forensics and Security.
[15] Noureddine Boudriga,et al. An RFID based System for the detection of Sybil attack in Military Wireless Sensor networks , 2014, 2014 World Congress on Computer Applications and Information Systems (WCCAIS).
[16] Ben Y. Zhao,et al. Uncovering social network sybils in the wild , 2011, IMC '11.
[17] A. Babu Karuppiah,et al. SYBILSECURE: AN ENERGY EFFICIENT SYBIL ATTACK DETECTION TECHNIQUE IN WIRELESS SENSOR NETWORK , 2014 .
[18] K. Nirmal Raja,et al. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack , 2017, Journal of medical systems.
[19] Jin-Hee Cho,et al. Trust threshold based public key management in mobile ad hoc networks , 2016, Ad Hoc Networks.
[20] Hamzeh Beyranvand,et al. Cellular Underwater Wireless Optical CDMA Network: Potentials and Challenges , 2016, IEEE Access.
[21] Feng Xiao,et al. DSybil: Optimal Sybil-Resistance for Recommendation Systems , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[22] Ratnaraj Kumar,et al. Recent Trends in Sybil Attacks and Defense Techniques in Social Networks , 2014 .
[23] Fengyuan Xu,et al. SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[24] Javad Musevi Niya,et al. Security bootstrapping of mobile ad hoc networks using identity-based cryptography , 2016, Secur. Commun. Networks.
[25] Laurence T. Yang,et al. Analytical Model for Sybil Attack Phases in Internet of Things , 2019, IEEE Internet of Things Journal.
[26] Luciano Paschoal Gaspary,et al. Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks , 2012, Comput. Networks.
[27] B. Paramasivan,et al. Defense against Sybil attacks and authentication for anonymous location-based routing in MANET , 2017, Wirel. Networks.