Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6633
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSingh, Aditi Nandan-
dc.contributor.authorSharma, Sarthak-
dc.contributor.authorVasudeva, Amol [Guided by]-
dc.date.accessioned2022-09-24T07:02:50Z-
dc.date.available2022-09-24T07:02:50Z-
dc.date.issued2017-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6633-
dc.description.abstractSybil attack was first introduced by J. R. Douceur. According to him, the Sybil attack is an attack in which a single node can rule in the system by presenting multiple fake identities and behaving like multiple legitimate nodes[8].en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectFabricated identityen_US
dc.subjectSybil attacken_US
dc.titleA Key Pool Approach to Prevent a Sybil Attack in Wireless Sensor Networksen_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Key Pool Approach to Prevent a Sybil Attack in Wireless Sensor Networks.pdf1.98 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.