Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6633
Title: | A Key Pool Approach to Prevent a Sybil Attack in Wireless Sensor Networks |
Authors: | Singh, Aditi Nandan Sharma, Sarthak Vasudeva, Amol [Guided by] |
Keywords: | Fabricated identity Sybil attack |
Issue Date: | 2017 |
Publisher: | Jaypee University of Information Technology, Solan, H.P. |
Abstract: | Sybil attack was first introduced by J. R. Douceur. According to him, the Sybil attack is an attack in which a single node can rule in the system by presenting multiple fake identities and behaving like multiple legitimate nodes[8]. |
URI: | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6633 |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Key Pool Approach to Prevent a Sybil Attack in Wireless Sensor Networks.pdf | 1.98 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.