Author:
Wen Mi,Li Hui,Zheng Yan-fei,Chen Ke-fei
Publisher
Springer Science and Business Media LLC
Subject
General Engineering,General Mathematics
Reference9 articles.
1. Douceur J R. The Sybil attack [C]//Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS’ 02), Cambridge, MA, USA. 2002, 2429: 251–260.
2. Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures [C]//Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA. 2003.
3. Newsome J, Shi E, Song D, Perring A. The Sybil attack in sensor networks: analysis & defenses [C]//Proceedings of the Third International Symposium on Information Processing in Sensor Networks (IPSN’ 04), Berkeley, CA, USA. 2004: 259–268.
4. Bazzi R A, Goran K. On the establishment of distinct identities in overlay networks [C]//ACM Symposium on Principles of Distributed Computing, Las Vegas, NV, USA. 2005: 312–320.
5. Demirbas M, Song Y W. An RSSI-based scheme for sybil attack detection in wireless sensor networks [C]//International Workshop on Wireless Mobile Multimedia (WOWMOM’06), New York, USA. 2006: 564–570.
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献