标题
Sybil Attacks and Their Defenses in the Internet of Things
作者
关键词
-
出版物
IEEE Internet of Things Journal
Volume 1, Issue 5, Pages 372-383
出版商
Institute of Electrical and Electronics Engineers (IEEE)
发表日期
2014-07-31
DOI
10.1109/jiot.2014.2344013
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Intelligent Device-to-Device Communication in the Internet of Things
- (2016) Oladayo Bello et al. IEEE Systems Journal
- Exploiting multimedia services in mobile social networks from security and privacy perspectives
- (2014) Kuan Zhang et al. IEEE COMMUNICATIONS MAGAZINE
- Developing Vehicular Data Cloud Services in the IoT Environment
- (2014) Wu He et al. IEEE Transactions on Industrial Informatics
- Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
- (2014) Xiaohui Liang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Security and privacy in mobile social networks: challenges and solutions
- (2014) Xiaohui Liang et al. IEEE WIRELESS COMMUNICATIONS
- Special issue on “New sensing and processing technologies for hand-based biometrics authentication”
- (2014) David Zhang et al. INFORMATION SCIENCES
- An Information Framework for Creating a Smart City Through Internet of Things
- (2014) Jiong Jin et al. IEEE Internet of Things Journal
- Comparative Investigation on CSMA/CA-Based Opportunistic Random Access for Internet of Things
- (2014) Chong Tang et al. IEEE Internet of Things Journal
- A Novel Deployment Scheme for Green Internet of Things
- (2014) Jun Huang et al. IEEE Internet of Things Journal
- CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service
- (2014) Chengzhe Lai et al. IEEE Internet of Things Journal
- Enabling smart cities through a cognitive management framework for the internet of things
- (2013) Panagiotis Vlacheas et al. IEEE COMMUNICATIONS MAGAZINE
- Context Aware Computing for The Internet of Things: A Survey
- (2013) Charith Perera et al. IEEE Communications Surveys and Tutorials
- Fully Anonymous Profile Matching in Mobile Social Networks
- (2013) Xiaohui Liang et al. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- LSR: Mitigating Zero-Day Sybil Vulnerability in Privacy-Preserving Vehicular Peer-to-Peer Networks
- (2013) Xiaodong Lin IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- SOS: A Distributed Mobile Q&A SystemBased on Social Networks
- (2013) Haiying Shen et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Detecting Sybil attacks in VANETs
- (2013) Bo Yu et al. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
- Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support
- (2013) Soyoung Park et al. Security and Communication Networks
- PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid
- (2013) Mi Wen et al. IEEE Transactions on Emerging Topics in Computing
- Management of resource constrained devices in the internet of things
- (2012) Anuj Sehgal et al. IEEE COMMUNICATIONS MAGAZINE
- A Survey on Distributed Topology Control Techniques for Extending the Lifetime of Battery Powered Wireless Sensor Networks
- (2012) A. A. Aziz et al. IEEE Communications Surveys and Tutorials
- Lightweight Sybil Attack Detection in MANETs
- (2012) Sohail Abbas et al. IEEE Systems Journal
- E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity
- (2012) Adam C. Champion et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Enabling pervasive healthcare through continuous remote health monitoring
- (2012) Xiaohui Liang et al. IEEE WIRELESS COMMUNICATIONS
- M2M-based metropolitan platform for IMS-enabled road traffic management in IoT
- (2011) Luca Foschini et al. IEEE COMMUNICATIONS MAGAZINE
- Smart community: an internet of things application
- (2011) Xu Li et al. IEEE COMMUNICATIONS MAGAZINE
- P2DAP — Sybil Attacks Detection in Vehicular Ad Hoc Networks
- (2011) Tong Zhou et al. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- A Wearable Device for Real-Time Motion Error Detection and Vibrotactile Instructional Cuing
- (2011) Beom-Chan Lee et al. IEEE TRANSACTIONS ON NEURAL SYSTEMS AND REHABILITATION ENGINEERING
- Cardinality Estimation for Large-Scale RFID Systems
- (2011) Chen Qian et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Secret key generation exploiting channel characteristics in wireless communications
- (2011) Kui Ren et al. IEEE WIRELESS COMMUNICATIONS
- Data security and privacy in wireless body area networks
- (2010) Ming Li et al. IEEE WIRELESS COMMUNICATIONS
- QRS Detection Based on Multiscale Mathematical Morphology for Wearable ECG Devices in Body Area Networks
- (2009) Fei Zhang et al. IEEE Transactions on Biomedical Circuits and Systems
- Channel-Based Detection of Sybil Attacks in Wireless Networks
- (2009) Liang Xiao et al. IEEE Transactions on Information Forensics and Security
- A Survey on Wearable Sensor-Based Systems for Health Monitoring and Prognosis
- (2009) A. Pantelopoulos et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND RE
- Passive Diagnosis for Wireless Sensor Networks
- (2009) Yunhao Liu et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks
- (2009) Haifeng Yu et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
- (2008) Kui Ren et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- SybilGuard: Defending Against Sybil Attacks via Social Networks
- (2008) Haifeng Yu et al. IEEE-ACM TRANSACTIONS ON NETWORKING
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started