The sybil attack in sensor networks
Top Cited Papers
- 26 April 2004
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 259-268
- https://doi.org/10.1145/984622.984660
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- SWATT: software-based attestation for embedded devicesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Random key-assignment for secure Wireless Sensor NetworksPublished by Association for Computing Machinery (ACM) ,2003
- A pairwise key pre-distribution scheme for wireless sensor networksPublished by Association for Computing Machinery (ACM) ,2003
- Secure verification of location claimsPublished by Association for Computing Machinery (ACM) ,2003
- A key-management scheme for distributed sensor networksPublished by Association for Computing Machinery (ACM) ,2002
- RADAR: an in-building RF-based user location and tracking systemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- GHTPublished by Association for Computing Machinery (ACM) ,2002
- GPSRPublished by Association for Computing Machinery (ACM) ,2000
- The Cricket location-support systemPublished by Association for Computing Machinery (ACM) ,2000
- Location-aided routing (LAR) in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,1998