Log-logarithmic selection resolution protocols in a multiple access channel
SIAM Journal on Computing
Ethernet: distributed packet switching for local computer networks
Communications of the ACM
Randomized Initialization Protocols for Packet Radio Networks
IPPS '99/SPDP '99 Proceedings of the 13th International Symposium on Parallel Processing and the 10th Symposium on Parallel and Distributed Processing
Randomized O (log log n)-Round Leader Election Protocols in Packet Radio Networks
ISAAC '98 Proceedings of the 9th International Symposium on Algorithms and Computation
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Randomized Leader Election Protocols in Radio Networks with No Collision Detection
ISAAC '00 Proceedings of the 11th International Conference on Algorithms and Computation
Pricing via Processing or Combatting Junk Mail
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Secure communication over radio channels
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
Towards Fair Leader Election in Wireless Networks
ADHOC-NOW '09 Proceedings of the 8th International Conference on Ad-Hoc, Mobile and Wireless Networks
Proceedings of the 34th conference on Current trends in theory and practice of computer science
SOFSEM'08 Proceedings of the 34th conference on Current trends in theory and practice of computer science
Proofs of communication and its application for fighting spam
SOFSEM'08 Proceedings of the 34th conference on Current trends in theory and practice of computer science
Repelling Sybil-type attacks in wireless ad hoc systems
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Consensus and Mutual Exclusion in a Multiple Access Channel
IEEE Transactions on Parallel and Distributed Systems
Deterministic secure positioning in wireless sensor networks
Theoretical Computer Science
Secure initialization in single-hop radio networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Randomized leader election protocols in noisy radio networks with a single transceiver
ISPA'06 Proceedings of the 4th international conference on Parallel and Distributed Processing and Applications
Hi-index | 0.00 |
It has been shown that Sybil attack -- forging identities in order to gain disproportional influence on a distributed system -- can be easily applied in Wireless Sensor Networks (WSN). An adversary capturing a few stations can corrupt most of classic protocols (e.g. leader election procedures) in most of considered models. Moreover, such attack is in practice undetectable in many realistic scenarios. In this paper we present an efficient countermeasure against Sybil attack. It is based on Proofs-of-Work technique -- one of the methods of preventing sending spam. In contrast to previous solutions it is based only on limited computational power of the adversarial devices. Our approach does not require any restrictions on communication between adversarial stations.