Articles with "sybil attacks" as a keyword



Photo by lensingmyworld from unsplash

Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2836898

Abstract: For location-aware applications in wireless sensor networks (WSNs), it is important to ensure that sensor nodes can get correct locations in a hostile WSNs. Sybil attacks, which are vital threats in WSNs, especially in the… read more here.

Keywords: sensor; sybil; scheme; sybil attacks ... See more keywords
Photo by worldsbetweenlines from unsplash

Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2020.2963962

Abstract: In this article, a scheme to detect both clone and Sybil attacks by using channel-based machine learning is proposed. To identify malicious attacks, channel responses between sensor peers have been explored as a form of… read more here.

Keywords: industrial wireless; authentication; sybil attacks; edge ... See more keywords
Photo from wikipedia

Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Intelligent Transportation Systems"

DOI: 10.1109/tits.2022.3165513

Abstract: In the context of current smart cities, Cooperative Intelligent Transportation Systems (C-ITS) represent one of the main use case scenarios that aim to improve peoples’ daily lives. Thus, during the last few years, numerous standards… read more here.

Keywords: sybil attack; detect sybil; sybil; sybil attacks ... See more keywords
Photo by anniespratt from unsplash

Detecting Sybil Attacks in Vehicular Fog Networks Using RSSI and Blockchain

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Network and Service Management"

DOI: 10.1109/tnsm.2022.3216073

Abstract: Vehicular Fog Computing (VFC) is a paradigm of vehicular networks that has a set of advantages such as agility, efficiency, and reduced latency. The VFC is vulnerable to a variety of attacks, and existing security… read more here.

Keywords: vehicular fog; blockchain; sybil attacks; rssi ... See more keywords