Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6633
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Singh, Aditi Nandan | - |
dc.contributor.author | Sharma, Sarthak | - |
dc.contributor.author | Vasudeva, Amol [Guided by] | - |
dc.date.accessioned | 2022-09-24T07:02:50Z | - |
dc.date.available | 2022-09-24T07:02:50Z | - |
dc.date.issued | 2017 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6633 | - |
dc.description.abstract | Sybil attack was first introduced by J. R. Douceur. According to him, the Sybil attack is an attack in which a single node can rule in the system by presenting multiple fake identities and behaving like multiple legitimate nodes[8]. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Fabricated identity | en_US |
dc.subject | Sybil attack | en_US |
dc.title | A Key Pool Approach to Prevent a Sybil Attack in Wireless Sensor Networks | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Key Pool Approach to Prevent a Sybil Attack in Wireless Sensor Networks.pdf | 1.98 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.