Detecting sybil attacks inwireless and sensor networks using cluster analysis

@article{Yang2008DetectingSA,
  title={Detecting sybil attacks inwireless and sensor networks using cluster analysis},
  author={Jie Yang and Yingying Chen and Wade Trappe},
  journal={2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems},
  year={2008},
  pages={834-839}
}
Wireless networks are vulnerable to sybil attacks, in which a sybil node forges multiple identifications to trick the system and conduct harmful attacks. The traditional approach to address sybil attacks is to employ cryptographic-related methods. However, conventional security approaches may not always desirable due to their infrastructural overhead. In this paper, we propose to utilize K-means cluster analysis for detecting sybil attacks based on the spatial correlation between the signal… CONTINUE READING
Highly Cited
This paper has 31 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 19 extracted citations

A Proposed Framework for Protection of Identity Based Attack in Zigbee

2015 Fifth International Conference on Communication Systems and Network Technologies • 2015
View 3 Excerpts
Highly Influenced

Survey of Identity-Based Attacks Detection Techniques in Wireless Networks Using Received Signal Strength

2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE) • 2018
View 2 Excerpts

Microwave photonic chaos based device fingerprinting

2017 Optical Fiber Communications Conference and Exhibition (OFC) • 2017
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 11 references

A Practical Approach to Landmark Deployment for Indoor Localization

2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks • 2006
View 2 Excerpts

An RSSI-based scheme for sybil attack detection in wireless sensor networks

2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06) • 2006

A taxonomy of dispersity routing schemes for fault tolerant real-tiem channels

A. Banerjea
In Proceedings ofECMAST, • 1999
View 1 Excerpt

Defend - ing against sybil attacks in sensor networks

S. Krishnamurthy
-1

Similar Papers

Loading similar papers…