A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
Wireless sensor networks (WSN) have been among the most prevalent wireless innovations
over the years exciting new Internet of Things (IoT) applications. IoT based WSN integrated …
over the years exciting new Internet of Things (IoT) applications. IoT based WSN integrated …
[PDF][PDF] Internet of Things Security: Layered classification of attacks and possible Countermeasures
Internet of Things is undoubtedly a well-known research area. In fact, ensuring security of
data exchange is among the great challenges of the Internet of things. In this paper, we …
data exchange is among the great challenges of the Internet of things. In this paper, we …
Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method
USRK Dhamodharan… - The Scientific World …, 2015 - Wiley Online Library
Wireless sensor networks are highly indispensable for securing network protection. Highly
critical attacks of various kinds have been documented in wireless sensor network till now by …
critical attacks of various kinds have been documented in wireless sensor network till now by …
[PDF][PDF] A survey of IoT security threats and defenses
Abstract Internet of Things (IoT) plays a well-known role in the interconnection of the
physical and virtual objects for the purpose of exchanging information. IoT environment can …
physical and virtual objects for the purpose of exchanging information. IoT environment can …
Wormhole and Sybil attack in WSN: a review
With the increasing popularity of mobile devices, recent developments in wireless
communication and the deployment of wireless sensor networks in the hostile environment …
communication and the deployment of wireless sensor networks in the hostile environment …
Security analysis for Sybil attack in sensor network using compare and match-position verification method
B Barani Sundaram, T Kedir, MK Mishra… - Mobile Computing and …, 2022 - Springer
Remote sensor networks are exceptionally simple to ensure organization security.
Particularly, basic assaults of different sorts are recorded in remote sensor networks by …
Particularly, basic assaults of different sorts are recorded in remote sensor networks by …
Analysis of machine learning data security in the internet of things (IoT) circumstance
The current Internet of things (IoT) technologies will also have a profound economic,
industrial and social influence on society. Teh ability of nodes to participate in IoT networks …
industrial and social influence on society. Teh ability of nodes to participate in IoT networks …
Wireless sensor network to connect isolated nodes using link assessment technique
A simultaneous geography control effort is implemented for full-reachability systems and a
genetic algorithm with dynamic transformation to find the breakthrough in a blaze-scene …
genetic algorithm with dynamic transformation to find the breakthrough in a blaze-scene …
Network security analysis for signal strength based packet filitering
Signal Strength based position check is all the more encouraging when contrasted with
other Sybil assault discovery methods since it is lightweight and doesn't need centralization …
other Sybil assault discovery methods since it is lightweight and doesn't need centralization …
Performance evaluation of sybil attack in cyber physical system
Abstract Cyber Physical System (CPS) links physical world with virtual world of information
processing through sensors and actuators. CPS is advanced smart and intelligent …
processing through sensors and actuators. CPS is advanced smart and intelligent …