The sybil attack in sensor networks

We demonstrate that the attack can be exceedingly detrimental to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc

James Newsome; Elaine Shi; Dawn Song; Adrian Perrig

2004

Scholarcy highlights

  • Security is important for many sensor network applications
  • This paper systematically analyzes the threat posed by the Sybil attack to wireless sensor networks
  • We demonstrate that the attack can be exceedingly detrimental to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc
  • We establish a classification of different types of the Sybil attack, which enables us to better understand the threats posed by each type, and better design countermeasures against each type
  • We propose several novel techniques to defend against the Sybil attack, and analyze their effectiveness quantitatively
  • The process may takea few minutes but once it finishes a file will be downloaded on your browser soplease do not close the new tab

Need more features? Save interactive summary cards to your Scholarcy Library.