Location-aided routing (LAR) in mobile ad hoc networks
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Routing with guaranteed delivery in ad hoc wireless networks
Wireless Networks
GHT: a geographic hash table for data-centric storage
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
TAG: a Tiny AGgregation service for Ad-Hoc sensor networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Detecting and correcting malicious data in VANETs
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
Toward resilient security in wireless sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
On the establishment of distinct identities in overlay networks
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
SeRLoc: Robust localization for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
ANSWER: autonomous wireless sensor network
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks
IEEE Transactions on Dependable and Secure Computing
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks
IEEE Transactions on Dependable and Secure Computing
Improved topology assumptions for threshold cryptography in mobile ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Improving key predistribution with deployment knowledge in static sensor networks
ACM Transactions on Sensor Networks (TOSN)
An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
An efficient and secure protocol for sensor network time synchronization
Journal of Systems and Software
A probabilistic voting-based filtering scheme in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Robust statistical methods for securing wireless localization in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
ROPE: robust position estimation in wireless sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Suicide for the common good: a new strategy for credential revocation in self-organizing systems
ACM SIGOPS Operating Systems Review
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Detection and localization of sybil nodes in VANETs
DIWANS '06 Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks
Improved security in geographic ad hoc routing through autonomous position verification
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Probabilistic validation of aggregated data in vehicular ad-hoc networks
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
An application-driven perspective on wireless sensor network security
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
Visualization assisted detection of sybil attacks in wireless networks
Proceedings of the 3rd international workshop on Visualization for computer security
SIGF: a family of configurable, secure routing protocols for wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
Proceedings of the 13th ACM conference on Computer and communications security
Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
A secure alternate path routing in sensor networks
Computer Communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
Computer Communications
Backbone construction in selfish wireless networks
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
SecLEACH-On the security of clustered sensor networks
Signal Processing
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Analysis of range-free anchor-free localization in a wsn under wormhole attack
Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems
Stimulating cooperation in route discovery of ad hoc networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Interactive wormhole detection and evaluation
Information Visualization
Mobile Networks and Applications
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Mitigating attacks against virtual coordinate based routing in wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
International Journal of Security and Networks
Defence against packet injection in ad hoc networks
International Journal of Security and Networks
Secure neighbor discovery in wireless networks: formal investigation of possibility
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Secure localization with phantom node detection
Ad Hoc Networks
Providing VANET security through active position detection
Computer Communications
SybilGuard: defending against sybil attacks via social networks
IEEE/ACM Transactions on Networking (TON)
Malicious node detection in wireless sensor networks using weighted trust evaluation
Proceedings of the 2008 Spring simulation multiconference
Quantifying Resistance to the Sybil Attack
Financial Cryptography and Data Security
Comprehensible security synthesis for wireless sensor networks
Proceedings of the 3rd international workshop on Middleware for sensor networks
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
A Secure Message Percolation Scheme for Wireless Sensor Network
Information Networking. Towards Ubiquitous Networking and Services
A new method for intrusion detection on hierarchical wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Reporter node determination of replicated node detection in wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Security against Sybil Attack in Wireless Sensor Network through Location Verification
ICDCN '09 Proceedings of the 10th International Conference on Distributed Computing and Networking
Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers
CNSR '09 Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference
Proceedings of the 4th Annual International Conference on Wireless Internet
Distributed data source verification in wireless sensor networks
Information Fusion
Secure data aggregation in wireless sensor networks: A comprehensive overview
Computer Networks: The International Journal of Computer and Telecommunications Networking
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks
WWIC 2009 Proceedings of the 7th International Conference on Wired/Wireless Internet Communications
Transient-based identification of wireless sensor nodes
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
A Secure Framework for Location Verification in Pervasive Computing
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
Weighted trust evaluation-based malicious node detection for wireless sensor networks
International Journal of Information and Computer Security
INSENS: Intrusion-tolerant routing for wireless sensor networks
Computer Communications
Channel-based detection of Sybil attacks in wireless networks
IEEE Transactions on Information Forensics and Security
Identity-based secure protocol scheme for wireless sensor network
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
A multivariate key-establishment scheme for wireless sensor networks
IEEE Transactions on Wireless Communications
Detecting Sybil attacks in Wireless Sensor Networks using neighboring information
Computer Networks: The International Journal of Computer and Telecommunications Networking
Securing resource-constrained wireless ad hoc networks
IEEE Wireless Communications
Resilient cluster leader election for wireless sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
A simple non-interactive pairwise key establishment scheme in sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Pseudonyms in Cost-Sharing Games
WINE '09 Proceedings of the 5th International Workshop on Internet and Network Economics
Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks
Computer Communications
Resisting node spoofing attacks in random key predistribution schemes: a uniform design
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Architecture and incentive design of integrated cellular and disruption tolerant networks
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
Design and implementation of the Zigbee-based body sensor network system
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Method of detecting the sybil attack based on ranging in wireless sensor network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Mobility and cooperation to thwart node capture attacks in MANETs
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Private location-based information retrieval through user collaboration
Computer Communications
SAID: a self-adaptive intrusion detection system in wireless sensor networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Secure and robust virtual coordinate system in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
A secure time synchronization protocol for sensor network
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
On grid-based key pre-distribution: toward a better connectivity in wireless sensor network
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
New strategies for revocation in ad-hoc networks
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Informant: detecting sybils using incentives
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Intrusion detection in sensor networks using clustering and immune systems
IDEAL'09 Proceedings of the 10th international conference on Intelligent data engineering and automated learning
Towards a unifying approach in understanding security problems
ISSRE'09 Proceedings of the 20th IEEE international conference on software reliability engineering
Hybrid intrusion detection system for wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Integrated Computer-Aided Engineering
Algorithms for sensor and ad hoc networks: advanced lectures
Algorithms for sensor and ad hoc networks: advanced lectures
A lightweight secure architecture for wireless sensor networks
International Journal of Internet Technology and Secured Transactions
Distributed data-theft detection in wireless sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Security-aware routing and localization for a directional mission critical network
IEEE Journal on Selected Areas in Communications
Random-walk based approach to detect clone attacks in wireless sensor networks
IEEE Journal on Selected Areas in Communications
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
IEEE Transactions on Wireless Communications
Mobicent: a credit-based incentive system for disruption tolerant network
INFOCOM'10 Proceedings of the 29th conference on Information communications
From time domain to space domain: detecting replica attacks in mobile ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
An intrusion detection framework for sensor networks using ant colony
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Secure self-adaptive framework for distributed smart home sensor network
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Cognitive security protocol for sensor based VANET using Swarm intelligence
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Interactive detection of network anomalies via coordinated multiple views
Proceedings of the Seventh International Symposium on Visualization for Cyber Security
A novel defense mechanism against sybil attacks in VANET
Proceedings of the 3rd international conference on Security of information and networks
Defense against Sybil attack in vehicular ad hoc network based on roadside unit support
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Noninteractive pairwise key establishment for sensor networks
IEEE Transactions on Information Forensics and Security
A survey on key management mechanisms for distributed Wireless Sensor Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Spectrum based fraud detection in social networks
Proceedings of the 17th ACM conference on Computer and communications security
Securing wireless sensor networks: an identity-based cryptography approach
International Journal of Sensor Networks
Location verification using communication range variation for wireless sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Towards clock skew based services in wireless sensor networks
International Journal of Sensor Networks
Detecting sybil nodes in static and dynamic networks
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II
Repelling Sybil-type attacks in wireless ad hoc systems
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
A new monitor model for enhancing trust-based systems
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Improving security in WMNs with reputation systems and self-organizing maps
Journal of Network and Computer Applications
Proceedings of the 2011 International Conference on Communication, Computing & Security
Ant colony based approach for intrusion detection on cluster heads in WSN
Proceedings of the 2011 International Conference on Communication, Computing & Security
IEEE/ACM Transactions on Networking (TON)
SybilLimit: a near-optimal social network defense against sybil attacks
IEEE/ACM Transactions on Networking (TON)
Sybil attack detection based on signature vectors in VANETs
International Journal of Critical Computer-Based Systems
Defending against Sybil nodes in BitTorrent
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part II
Sybil defenses via social networks: a tutorial and survey
ACM SIGACT News
Uncovering social network sybils in the wild
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Performance analysis of HIP diet exchange for WSN security establishment
Proceedings of the 7th ACM symposium on QoS and security for wireless and mobile networks
A sybil attack detection approach using neighboring vehicles in VANET
Proceedings of the 4th international conference on Security of information and networks
Reliable telemetry in white spaces using remote attestation
Proceedings of the 27th Annual Computer Security Applications Conference
Diverging keys in wireless sensor networks
ISC'06 Proceedings of the 9th international conference on Information Security
Location verification based defense against sybil attack in sensor networks
ICDCN'06 Proceedings of the 8th international conference on Distributed Computing and Networking
A taxonomy of secure data aggregation in wireless sensor networks
International Journal of Communication Networks and Distributed Systems
Modelling and analysis of attacks on the MANET routing in AODV
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Improving sensor network security with information quality
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Local connectivity tests to identify wormholes in wireless networks
MobiHoc '11 Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing
A secure routing protocol for wireless sensor networks
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
Protecting anonymity in wireless medical monitoring environments
Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
ICA3PP'10 Proceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part I
A survey of Intrusion Detection Systems for Wireless Sensor Networks
International Journal of Ad Hoc and Ubiquitous Computing
On the security of wireless sensor networks
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
Review: Detecting node replication attacks in wireless sensor networks: A survey
Journal of Network and Computer Applications
Key management for mobile sensor networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Breaking the collusion detection mechanism of morphmix
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Ranger intrusion detection system for wireless sensor networks with Sybil attack based on ontology
AIC'10/BEBI'10 Proceedings of the 10th WSEAS international conference on applied informatics and communications, and 3rd WSEAS international conference on Biomedical electronics and biomedical informatics
A key management scheme with encoding and improved security for wireless sensor networks
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Privacy issues in vehicular ad hoc networks
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks
EWSN'06 Proceedings of the Third European conference on Wireless Sensor Networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Wireless sensor replica detection in mobile environments
ICDCN'12 Proceedings of the 13th international conference on Distributed Computing and Networking
Designing an efficient PCA based data model for wireless sensor networks
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
Private communication detection: a stochastic approach
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Foisting and stealing of keys in sensor networks
EWSN'12 Proceedings of the 9th European conference on Wireless Sensor Networks
R&D/Technology: ZigBee: A long way to go?
Infosecurity
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
Journal of Network and Computer Applications
Sybil attack detection through global topology pattern visualization
Information Visualization
Using Auxiliary Sensors for Pairwise Key Establishment in WSN
ACM Transactions on Embedded Computing Systems (TECS)
Self-stabilizing (k,r)-clustering in clock rate-limited systems
SIROCCO'12 Proceedings of the 19th international conference on Structural Information and Communication Complexity
On physical-layer identification of wireless devices
ACM Computing Surveys (CSUR)
Guard your connections: infiltration of a trust/reputation based network
Proceedings of the 3rd Annual ACM Web Science Conference
A key revocation scheme for mobile sensor networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
On the power of impersonation attacks
DISC'07 Proceedings of the 21st international conference on Distributed Computing
Improved multi-precision squaring for low-end RISC microcontrollers
Journal of Systems and Software
Denial of service mitigation approach for IPv6-enabled smart object networks
Concurrency and Computation: Practice & Experience
Robust localization against outliers in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Providing DoS resistance for signature-based broadcast authentication in sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Design and analysis of a social botnet
Computer Networks: The International Journal of Computer and Telecommunications Networking
Countermeasures against sybil attacks in WSN based on proofs-of-work
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
SybilCast: broadcast on the open airwaves (extended abstract)
Proceedings of the twenty-fifth annual ACM symposium on Parallelism in algorithms and architectures
Detecting Sybil attacks in VANETs
Journal of Parallel and Distributed Computing
Analysis of the applicability of wireless sensor networks attacks to body area networks
BodyNets '13 Proceedings of the 8th International Conference on Body Area Networks
Uncovering social network Sybils in the wild
ACM Transactions on Knowledge Discovery from Data (TKDD) - Casin special issue
Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach
The Journal of Supercomputing
Clone wars: Distributed detection of clone attacks in mobile WSNs
Journal of Computer and System Sciences
A defense against clock skew replication attacks in wireless sensor networks
Journal of Network and Computer Applications
A k-anonymity privacy-preserving approach in wireless medical monitoring environments
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node illegitimately claims multiple identities. This paper systematically analyzes the threat posed by the Sybil attack to wireless sensor networks. We demonstrate that the attack can be exceedingly detrimental to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc. We establish a classification of different types of the Sybil attack, which enables us to better understand the threats posed by each type, and better design countermeasures against each type. We then propose several novel techniques to defend against the Sybil attack, and analyze their effectiveness quantitatively.