The sybil attack in sensor networks

  • Newsome J
  • Shi E
  • Song D
  • et al.
N/ACitations
Citations of this article
103Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Attacks on ad hoc network routing protocols disrupt network performance and reliability. The article reviews attacks on ad hoc networks and discusses current approaches for establishing cryptographic keys in ad hoc networks. We describe the state of research in secure ad hoc routing protocols and its research challenges.

Cite

CITATION STYLE

APA

Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks (pp. 259–268). Association for Computing Machinery (ACM). https://doi.org/10.1145/984622.984660

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free