Articles with "sybil" as a keyword



Photo by lensingmyworld from unsplash

Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2836898

Abstract: For location-aware applications in wireless sensor networks (WSNs), it is important to ensure that sensor nodes can get correct locations in a hostile WSNs. Sybil attacks, which are vital threats in WSNs, especially in the… read more here.

Keywords: sensor; sybil; scheme; sybil attacks ... See more keywords
Photo from wikipedia

Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Intelligent Transportation Systems"

DOI: 10.1109/tits.2022.3165513

Abstract: In the context of current smart cities, Cooperative Intelligent Transportation Systems (C-ITS) represent one of the main use case scenarios that aim to improve peoples’ daily lives. Thus, during the last few years, numerous standards… read more here.

Keywords: sybil attack; detect sybil; sybil; sybil attacks ... See more keywords