Defending against Sybil attacks in sensor networks

@article{Zhang2005DefendingAS,
  title={Defending against Sybil attacks in sensor networks},
  author={Qinghua Zhang and Pan Wang and Douglas S. Reeves and Peng Ning},
  journal={25th IEEE International Conference on Distributed Computing Systems Workshops},
  year={2005},
  pages={185-191}
}
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certificates are a way to prove identities. However, they are not viable in sensor networks. In this paper, we propose a light-weight identity certificate method to defeat Sybil attacks. Our proposed method uses one-way key chains and Merkle hash trees. The method thereby avoids the need for public key cryptography. In… CONTINUE READING

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 90 CITATIONS

Sybil attack detection in a hierarchical sensor network

  • 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007
  • 2007
VIEW 10 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

A Proposed Framework for Protection of Identity Based Attack in Zigbee

  • 2015 Fifth International Conference on Communication Systems and Network Technologies
  • 2015
VIEW 3 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure

  • IEEE Transactions on Mobile Computing
  • 2011
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

An Admission Control Scheme for Sensor Networks

  • 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing
  • 2010
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2006
2018

CITATION STATISTICS

  • 6 Highly Influenced Citations

References

Publications referenced by this paper.
SHOWING 1-10 OF 13 REFERENCES

A key-management scheme for distributed sensor networks

  • ACM Conference on Computer and Communications Security
  • 2002
VIEW 1 EXCERPT

Talk - ing to strangers : Authentication in ad - hoc wireless networks Identity based encryption from the weil pairing The sybil attack

D. Smetters D. Balfanz, P. Stewart, H. C. Wong
  • First International Workshop on Peer - to - Peer Systems ( IPTPS ’ 02 )
  • 2002

The Sybil Attack

VIEW 1 EXCERPT