Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2836898
Abstract: For location-aware applications in wireless sensor networks (WSNs), it is important to ensure that sensor nodes can get correct locations in a hostile WSNs. Sybil attacks, which are vital threats in WSNs, especially in the…
read more here.
Keywords:
sensor;
sybil;
scheme;
sybil attacks ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2020.2963962
Abstract: In this article, a scheme to detect both clone and Sybil attacks by using channel-based machine learning is proposed. To identify malicious attacks, channel responses between sensor peers have been explored as a form of…
read more here.
Keywords:
industrial wireless;
authentication;
sybil attacks;
edge ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Intelligent Transportation Systems"
DOI: 10.1109/tits.2022.3165513
Abstract: In the context of current smart cities, Cooperative Intelligent Transportation Systems (C-ITS) represent one of the main use case scenarios that aim to improve peoples’ daily lives. Thus, during the last few years, numerous standards…
read more here.
Keywords:
sybil attack;
detect sybil;
sybil;
sybil attacks ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Network and Service Management"
DOI: 10.1109/tnsm.2022.3216073
Abstract: Vehicular Fog Computing (VFC) is a paradigm of vehicular networks that has a set of advantages such as agility, efficiency, and reduced latency. The VFC is vulnerable to a variety of attacks, and existing security…
read more here.
Keywords:
vehicular fog;
blockchain;
sybil attacks;
rssi ... See more keywords