Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems

  • Marek Klonowski
  • Michał Koza
  • Mirosław Kutyłowski
Conference paper

DOI: 10.1007/978-3-642-14081-5_24

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6168)
Cite this paper as:
Klonowski M., Koza M., Kutyłowski M. (2010) Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems. In: Steinfeld R., Hawkes P. (eds) Information Security and Privacy. ACISP 2010. Lecture Notes in Computer Science, vol 6168. Springer, Berlin, Heidelberg

Abstract

We consider ad hoc wireless networks and adversaries that try to gain control over the network by Sybil attacks, that is by emulating more physical nodes that are really under his control.We present the first defense method that works for the case when the adversary controls more than one device and these devices have some prior agreement on strategy executed and share preloaded secrets.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Marek Klonowski
    • 1
  • Michał Koza
    • 1
  • Mirosław Kutyłowski
    • 1
  1. 1.Institute of Mathematics and Computer ScienceWrocław University of Technology 

Personalised recommendations