메뉴 건너뛰기




Volumn 14, Issue 11, 2015, Pages 2376-2391

The mason test: A defense against sybil attacks in wireless networks without trusted authorities

Author keywords

Ad hoc networks; Security; Sybil attack; Wireless networks

Indexed keywords

AD HOC NETWORKS; COMPUTER CRIME; DELAY TOLERANT NETWORKS; DISTRIBUTED COMPUTER SYSTEMS; NETWORK SECURITY; TELECOMMUNICATION NETWORKS; WIRELESS NETWORKS;

EID: 84952313614     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2015.2398425     Document Type: Article
Times cited : (32)

References (27)
  • 1
    • 80052124479 scopus 로고    scopus 로고
    • Bubble rap: Social-based forwarding in delay tolerant networks
    • Nov
    • P. Hui, J. Crowcroft, and E. Yoneki, "BUBBLE rap: Social-based forwarding in delay tolerant networks, " IEEE Trans. Mobile Comput., vol. 10, no. 11, pp. 1576-1589, Nov. 2011.
    • (2011) IEEE Trans. Mobile Comput , vol.10 , Issue.11 , pp. 1576-1589
    • Hui, P.1    Crowcroft, J.2    Yoneki, E.3
  • 3
    • 84936753093 scopus 로고    scopus 로고
    • Sustaining telecommunications capability and capacity during acute phase of disasters and disaster responses
    • May
    • P. Gardner-Stephen, "Sustaining telecommunications capability and capacity during acute phase of disasters and disaster responses, " Prehospital and Disaster Medicine, vol. 26, pp. s94-s95, May 2011.
    • (2011) Prehospital and Disaster Medicine , vol.26 , pp. s94-s95
    • Gardner-Stephen, P.1
  • 6
    • 44649144215 scopus 로고    scopus 로고
    • A survey of solutions to the sybil attack
    • Univ. Massachusetts Amherst, Amherst, MA, USA, Tech. Rep. 2006-052, Oct
    • B. N. Levine, C. Shields, and N. B. Margolin, "A survey of solutions to the Sybil attack, " Dept. Comput. Sci., Univ. Massachusetts Amherst, Amherst, MA, USA, Tech. Rep. 2006-052, Oct. 2006.
    • (2006) Dept. Comput. Sci
    • Levine, B.N.1    Shields, C.2    Margolin, N.B.3
  • 7
    • 33846626862 scopus 로고    scopus 로고
    • Multiple-key cryptography based distributed certificate authority in mobile ad-hoc networks
    • Nov
    • H. Zhou, M. Mutka, and L. Ni, "Multiple-key cryptographybased distributed certificate authority in mobile ad-hoc networks, " in Proc. Global Telecommun. Conf., vol. 3, Nov. 2005, pp. 1681-1685.
    • (2005) Proc. Global Telecommun. Conf , vol.3 , pp. 1681-1685
    • Zhou, H.1    Mutka, M.2    Ni, L.3
  • 8
    • 15244360279 scopus 로고    scopus 로고
    • An efficient key predistribution scheme for ad hoc network security
    • Mar
    • M. Ramkumar, and N. Memon, "An efficient key predistribution scheme for ad hoc network security, " IEEE J. Select. Areas Commun., vol. 23, no. 3, pp. 611-621, Mar. 2005.
    • (2005) IEEE J. Select. Areas Commun , vol.23 , Issue.3 , pp. 611-621
    • Ramkumar, M.1    Memon, N.2
  • 9
    • 85027289714 scopus 로고    scopus 로고
    • Computational puzzles as sybil defenses
    • Sep
    • N. Borisov, "Computational puzzles as Sybil defenses, " in Proc. Int. Conf. Peer-to-Peer Comput., Sep. 2006, pp. 171-176.
    • (2006) Proc. Int. Conf. Peer-to-Peer Comput , pp. 171-176
    • Borisov, N.1
  • 12
    • 45749116664 scopus 로고    scopus 로고
    • Sybillimit: A nearoptimal social network defense against sybil attacks
    • May
    • H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, "SybilLimit: A nearoptimal social network defense against Sybil attacks, " in Proc. Symp. Security Privacy, May 2008, pp. 3-17.
    • (2008) Proc. Symp. Security Privacy , pp. 3-17
    • Yu, H.1    Gibbons, P.2    Kaminsky, M.3    Xiao, F.4
  • 16
    • 34247324807 scopus 로고    scopus 로고
    • Detecting identity-based attacks in wireless networks using signalprints
    • Sep
    • D. B. Faria and D. R. Cheriton, "Detecting identity-based attacks in wireless networks using signalprints, " in Proc. Workshop Wireless Security, Sep. 2006, pp. 43-52.
    • (2006) Proc. Workshop Wireless Security , pp. 43-52
    • Faria, D.B.1    Cheriton, D.R.2
  • 17
    • 33845926634 scopus 로고    scopus 로고
    • An rssi-based scheme for sybil attack detection in wireless sensor networks
    • Jun
    • M. Demirbas and Y. Song, "An RSSI-based scheme for Sybil attack detection in wireless sensor networks, " in Proc. Int. Symp. World Wireless, Mobile, Multimedia, Jun. 2006, pp. 564-570.
    • (2006) Proc. Int. Symp. World Wireless, Mobile, Multimedia , pp. 564-570
    • Demirbas, M.1    Song, Y.2
  • 18
    • 77953789262 scopus 로고    scopus 로고
    • Detecting and localizing identity-based attacks in wireless and sensor networks
    • Jun
    • Y. Chen, J. Yang, W. Trappe, and R. P. Martin, "Detecting and localizing identity-based attacks in wireless and sensor networks, " IEEE Trans. Veh. Technol., vol. 5, no. 5, pp. 2418-2434, Jun. 2010.
    • (2010) IEEE Trans. Veh. Technol , vol.5 , Issue.5 , pp. 2418-2434
    • Chen, Y.1    Yang, J.2    Trappe, W.3    Martin, R.P.4
  • 19
    • 33750343693 scopus 로고    scopus 로고
    • Peer identification in wireless and sensor networks using signal properties
    • Nov
    • T. Suen and A. Yasinsac, "Peer identification in wireless and sensor networks using signal properties, " in Proc. Int. Conf. Mobile Ad Hoc Sensor Syst., Nov. 2005, pp. 826-833.
    • (2005) Proc. Int. Conf. Mobile Ad Hoc Sensor Syst , pp. 826-833
    • Suen, T.1    Yasinsac, A.2
  • 20
    • 60349099898 scopus 로고    scopus 로고
    • Detecting the sybil attack cooperatively in wireless sensor networks
    • Dec
    • S. Lv, X. Wang, X. Zhao, and X. Zhou, "Detecting the Sybil attack cooperatively in wireless sensor networks, " in Proc. Int. Conf. Comput. Intell. Security, Dec. 2008, pp. 442-446.
    • (2008) Proc. Int. Conf. Comput. Intell. Security , pp. 442-446
    • Lv, S.1    Wang, X.2    Zhao, X.3    Zhou, X.4
  • 21
    • 70349947496 scopus 로고    scopus 로고
    • Sybil nodes detection based on received strength variations within vanet
    • Jul
    • M. S. Bouassida, G. Guette, M. Shawky, and B. Ducourthial, "Sybil nodes detection based on received strength variations within VANET, " Int. J. Netw. Security, vol. 9, no. 1, pp. 22-33, Jul. 2009.
    • (2009) Int. J. Netw. Security , vol.9 , Issue.1 , pp. 22-33
    • Bouassida, M.S.1    Guette, G.2    Shawky, M.3    Ducourthial, B.4
  • 23
    • 0038343420 scopus 로고    scopus 로고
    • From theory to practice: An overview of MIMO space-time coded wireless systems
    • Apr
    • D. Gesbert, M. Shafi, D. Shiu, P. J. Smith, and A. Naguib., "From theory to practice: An overview of MIMO space-time coded wireless systems, " IEEE J. Select. Areas Commun., vol. 21, no. 3, pp. 281-302, Apr. 2003.
    • (2003) IEEE J. Select. Areas Commun , vol.21 , Issue.3 , pp. 281-302
    • Gesbert, D.1    Shafi, M.2    Shiu, D.3    Smith, P.J.4    Naguib, A.5
  • 24
    • 84952352870 scopus 로고    scopus 로고
    • Extending channel comparison based sybil detection to MIMO systems
    • Univ. of Michigan, Ann Arbor, MI, USA Tech. Rep. CSETR-, Nov
    • Y. Liu, D. R. Bild, and R. P. Dick, "Extending channel comparison based Sybil detection to MIMO systems, " Dept. Elect. Eng. Comput. Sci., Univ. of Michigan, Ann Arbor, MI, USA Tech. Rep. CSETR- 584-13, Nov. 2013.
    • (2013) Dept. Elect. Eng. Comput. Sci , pp. 584-613
    • Liu, Y.1    Bild, D.R.2    Dick, R.P.3
  • 25
    • 85033516322 scopus 로고
    • Statistical modeling of the indoor radio propagation channel-part II
    • May
    • H. Hashemi, D. Lee, and D. Ehman, "Statistical modeling of the indoor radio propagation channel-Part II, " in Proc. Veh. Technol. Conf., May 1992, pp. 839-843.
    • (1992) Proc. Veh. Technol. Conf. , pp. 839-843
    • Hashemi, H.1    Lee, D.2    Ehman, D.3
  • 26
    • 0026154174 scopus 로고
    • Statistical channel impulse response models for factory and open plan building radio communication system design
    • May
    • T. S. Rappaport, S. Y. Seidel, and K. Takamizawa, "Statistical channel impulse response models for factory and open plan building radio communication system design, " IEEE Trans. Commun., vol. 39, no. 5, pp. 794-806, May 1991.
    • (1991) IEEE Trans. Commun , vol.39 , Issue.5 , pp. 794-806
    • Rappaport, T.S.1    Seidel, S.Y.2    Takamizawa, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.