Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems
We consider ad hoc wireless networks and adversaries that try to gain control over the network by Sybil attacks, that is by emulating more physical nodes that are really under his control.We present the first defense method that works for the case when the adversary controls more than one device and these devices have some prior agreement on strategy executed and share preloaded secrets.
Unable to display preview. Download preview PDF.
- 1.IEEE 802.11 wireless local area networks, http://www.ieee802.org/11/ [cited February 14, 2010]
- 3.Shields, C., Levine, B.N., Boris Margolin, N.: A survey of solutions to the sybil attack (2006), http://prisms.cs.umass.edu/brian/bubs/levine.sybil.tr.2006.pdf
- 4.Levine, B.N., Piro, C., Shields, C.: Detecting the sybil attack in ad hoc networks. In: Proc. IEEE/ACM SecureComm., pp. 1–11 (2006)Google Scholar
- 8.Hayashi, T., Nakano, K., Olariu, S.: Randomized initialization protocols for packet radio networks. In: IPPS/SPDP, p. 544. IEEE Computer Society, Los Alamitos (1999)Google Scholar
- 10.Janson, S., Szpankowski, W.: Analysis of an asymmetric leader election algorithm. Electr. J. Comb. 4(1) (1997)Google Scholar