메뉴 건너뛰기




Volumn 1, Issue , 2008, Pages 442-446

Detecting the Sybil attack cooperatively in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

ANALYSIS AND SIMULATIONS; DETECTION MECHANISMS; MALICIOUS NODES; NETWORK APPLICATIONS; NETWORK THREATS; NODE COOPERATIONS; RECEIVED SIGNAL STRENGTHS; SYBIL ATTACKS; WIRELESS SENSORS;

EID: 60349099898     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIS.2008.69     Document Type: Conference Paper
Times cited : (51)

References (9)
  • 1
    • 33646402145 scopus 로고    scopus 로고
    • The Sybil Attack [C]
    • J. R. Douceur. The Sybil Attack [C]. In IPTPS 2002.
    • (2002) IPTPS
    • Douceur, J.R.1
  • 3
    • 0038349207 scopus 로고    scopus 로고
    • Tarzan: A peer-to-peer anonymizing network layer [C]
    • M. J. Freedman and R. Morris. Tarzan: A peer-to-peer anonymizing network layer [C]. In ACM CCS, 2002.
    • (2002) ACM CCS
    • Freedman, M.J.1    Morris, R.2
  • 5
    • 3242802867 scopus 로고    scopus 로고
    • M. Feldman, K. Lai, I. Stoica, and J. Chuang. Robust incentive techniques for peer-to-peer networks [C]. In ACME-Commerce Conference (EC'04), 2004.
    • M. Feldman, K. Lai, I. Stoica, and J. Chuang. Robust incentive techniques for peer-to-peer networks [C]. In ACME-Commerce Conference (EC'04), 2004.
  • 7
    • 33750285481 scopus 로고    scopus 로고
    • H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: Defending against Sybil attacks via social networks [C]. In Proc. ACM SIGCOMM, 2006.
    • H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: Defending against Sybil attacks via social networks [C]. In Proc. ACM SIGCOMM, 2006.
  • 8
    • 84880467894 scopus 로고    scopus 로고
    • S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks [C]. In Proceedings of the 12th WWW Conference, pages 640-651, 2003.
    • S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks [C]. In Proceedings of the 12th WWW Conference, pages 640-651, 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.