Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems
- Cite this paper as:
- Klonowski M., Koza M., Kutyłowski M. (2010) Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems. In: Steinfeld R., Hawkes P. (eds) Information Security and Privacy. ACISP 2010. Lecture Notes in Computer Science, vol 6168. Springer, Berlin, Heidelberg
We consider ad hoc wireless networks and adversaries that try to gain control over the network by Sybil attacks, that is by emulating more physical nodes that are really under his control.We present the first defense method that works for the case when the adversary controls more than one device and these devices have some prior agreement on strategy executed and share preloaded secrets.
Unable to display preview. Download preview PDF.