A survey of Sybil attack countermeasures in IoT-based wireless sensor networks

A Arshad, ZM Hanapi, S Subramaniam… - PeerJ Computer …, 2021 - peerj.com
Wireless sensor networks (WSN) have been among the most prevalent wireless innovations
over the years exciting new Internet of Things (IoT) applications. IoT based WSN integrated …

[PDF][PDF] Internet of Things Security: Layered classification of attacks and possible Countermeasures

O El Mouaatamid, M Lahmer, M Belkasmi - Electron. J. Inf. Technol, 2016 - revue-eti.net
Internet of Things is undoubtedly a well-known research area. In fact, ensuring security of
data exchange is among the great challenges of the Internet of things. In this paper, we …

Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method

USRK Dhamodharan… - The Scientific World …, 2015 - Wiley Online Library
Wireless sensor networks are highly indispensable for securing network protection. Highly
critical attacks of various kinds have been documented in wireless sensor network till now by …

[PDF][PDF] A survey of IoT security threats and defenses

HI Ahmed, AA Nasr, S Abdel-Mageid… - International Journal of …, 2019 - academia.edu
Abstract Internet of Things (IoT) plays a well-known role in the interconnection of the
physical and virtual objects for the purpose of exchanging information. IoT environment can …

Wormhole and Sybil attack in WSN: a review

S Goyal, T Bhatia, AK Verma - 2015 2nd international …, 2015 - ieeexplore.ieee.org
With the increasing popularity of mobile devices, recent developments in wireless
communication and the deployment of wireless sensor networks in the hostile environment …

Security analysis for Sybil attack in sensor network using compare and match-position verification method

B Barani Sundaram, T Kedir, MK Mishra… - Mobile Computing and …, 2022 - Springer
Remote sensor networks are exceptionally simple to ensure organization security.
Particularly, basic assaults of different sorts are recorded in remote sensor networks by …

Analysis of machine learning data security in the internet of things (IoT) circumstance

B Barani Sundaram, A Pandey, AT Abiko… - Expert Clouds and …, 2022 - Springer
The current Internet of things (IoT) technologies will also have a profound economic,
industrial and social influence on society. Teh ability of nodes to participate in IoT networks …

Wireless sensor network to connect isolated nodes using link assessment technique

BB Sundaram, A Pandey, AT Abiko… - … and Virtual Mobile …, 2021 - ieeexplore.ieee.org
A simultaneous geography control effort is implemented for full-reachability systems and a
genetic algorithm with dynamic transformation to find the breakthrough in a blaze-scene …

Network security analysis for signal strength based packet filitering

BB Sundaram, P Rajkumar, MM Ananthi… - 2020 3rd …, 2020 - ieeexplore.ieee.org
Signal Strength based position check is all the more encouraging when contrasted with
other Sybil assault discovery methods since it is lightweight and doesn't need centralization …

Performance evaluation of sybil attack in cyber physical system

D Kumari, K Singh, M Manjul - Procedia Computer Science, 2020 - Elsevier
Abstract Cyber Physical System (CPS) links physical world with virtual world of information
processing through sensors and actuators. CPS is advanced smart and intelligent …