A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
Wireless sensor networks (WSN) have been among the most prevalent wireless innovations over the years exciting new Internet of Things (IoT) applications. IoT based WSN integrated with Internet Protocol IP allows any physical objects with sensors to be connected ubiquitously and send real-time data t...
| Main Authors: | Arshad, Akashah, Mohd Hanapi, Zurina, Subramaniam, Shamala, Latip, Rohaya |
|---|---|
| Format: | Article |
| Published: |
PeerJ
2021
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/96125/ |
Similar Items
A survey of sybil attack countermeasures in underwater sensor and acoustic networks
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2023)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2023)
Energy trust system for detecting sybil attack in clustered wireless sensor networks
by: Alsaedi, Noor, et al.
Published: (2015)
by: Alsaedi, Noor, et al.
Published: (2015)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
by: Alsaedi, Noor, et al.
Published: (2017)
by: Alsaedi, Noor, et al.
Published: (2017)
Impact of blackhole and Sybil attacks on dynamic windows secured implicit geographic forwarding routing protocol
by: Mohd Hanapi, Zurina, et al.
Published: (2014)
by: Mohd Hanapi, Zurina, et al.
Published: (2014)
Mobility management for IoT: a survey
by: M. Ghaleb, Safwan, et al.
Published: (2016)
by: M. Ghaleb, Safwan, et al.
Published: (2016)
Reconfigurable Wireless Sensor Network Design for Environmental Monitoring in IoT Environment
by: Myint, Cho Zin
Published: (2018)
by: Myint, Cho Zin
Published: (2018)
Evaluation approach for efficient countermeasure techniques against denial-of-service attack on MPSoC-based IoT using multi-criteria decision-making
by: Al-Hchaimi, Ahmed Abbas Jasim, et al.
Published: (2022)
by: Al-Hchaimi, Ahmed Abbas Jasim, et al.
Published: (2022)
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
A Performance Investigation on IoT Enabled Intra-Vehicular Wireless Sensor Networks
by: Rahman, Md. Arafatur, et al.
Published: (2017)
by: Rahman, Md. Arafatur, et al.
Published: (2017)
Resourceful residual energy consumption in TDMA scheduling for IoT-based wireless sensor network
by: Rahiman, Amir Rizaan, et al.
Published: (2019)
by: Rahiman, Amir Rizaan, et al.
Published: (2019)
A novel energy-efficient sybil node detection algorithm for intrusion detection system in wireless sensor networks
by: Karuppiah, A. Babu, et al.
Published: (2014)
by: Karuppiah, A. Babu, et al.
Published: (2014)
Performance evaluation of the geographic routing protocols scalability
by: Arshad, Akashah, et al.
Published: (2019)
by: Arshad, Akashah, et al.
Published: (2019)
Node replication attacks in mobile wireless sensor network: a survey
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
A survey on cluster-based routing protocols in wireless sensor networks
by: Nokhanji, Nooshin, et al.
Published: (2014)
by: Nokhanji, Nooshin, et al.
Published: (2014)
IoTContact: a strategy for predicting contagious IoT nodes in mitigating ransomware attacks
by: Ibrahim, Mohammed, et al.
Published: (2021)
by: Ibrahim, Mohammed, et al.
Published: (2021)
Internet of things (IoT); security requirements, attacks and counter measures
by: Imdad, Maria, et al.
Published: (2020)
by: Imdad, Maria, et al.
Published: (2020)
An overview of attacks against digital watermarking and their respective countermeasures
by: Tanha, Maryam, et al.
Published: (2012)
by: Tanha, Maryam, et al.
Published: (2012)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Recent trends and future directions of congestion management strategies for routing in IoT-based wireless sensor network: a thematic review
by: Zainaddin, D.A., et al.
Published: (2024)
by: Zainaddin, D.A., et al.
Published: (2024)
Deep insight into IoT-enabled agriculture and network protocols
by: Hasan, Muhammad Zulkifl, et al.
Published: (2022)
by: Hasan, Muhammad Zulkifl, et al.
Published: (2022)
Efficient secure routing mechanisms for the low-powered IoT network: a literature review
by: Hussain, Muhammad Zunnurain, et al.
Published: (2023)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2023)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Evaluation Of Turbidity Measuring Using IoT Based Sensors
by: Tay, Ying Keat
Published: (2022)
by: Tay, Ying Keat
Published: (2022)
Efficient and secured mechanisms for data link in IoT WSNs: a literature review
by: Hasan, Muhammad Zulkifl, et al.
Published: (2023)
by: Hasan, Muhammad Zulkifl, et al.
Published: (2023)
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Faulty sensor detection mechanism using multi-variate sensors in IoT
by: Al-Atrakchii, Khaldoon Ammar
Published: (2019)
by: Al-Atrakchii, Khaldoon Ammar
Published: (2019)
Micro search engine for IoT: an IoT search engine prototype for private networks
by: Habaebi, Mohamed Hadi, et al.
Published: (2018)
by: Habaebi, Mohamed Hadi, et al.
Published: (2018)
A survey of state of the art: hierarchical routing algorithms for wireless sensor networks
by: Kareem, Husam, et al.
Published: (2014)
by: Kareem, Husam, et al.
Published: (2014)
Static and mobile data gathering techniques in Wireless Sensor Networks: a survey
by: M. Ghaleb, Mukhtar, et al.
Published: (2014)
by: M. Ghaleb, Mukhtar, et al.
Published: (2014)
A scheduled activity energy aware distributed clustering algorithm for wireless sensor networks with nonuniform node distribution
by: Nokhanji, Nooshin, et al.
Published: (2014)
by: Nokhanji, Nooshin, et al.
Published: (2014)
A survey of routing MAC techniques for wireless sensor networks routing protocol
by: Mohammed Ibbini, Emad, et al.
Published: (2015)
by: Mohammed Ibbini, Emad, et al.
Published: (2015)
Search and rescue operation in flooded areas: A survey on emerging sensor networking-enabled IoT-oriented technologies and applications
by: Hasan, Md. Munirul, et al.
Published: (2021)
by: Hasan, Md. Munirul, et al.
Published: (2021)
Investigating and analyzing simulation tools of wireless sensor networks: a comprehensive survey
by: Adday, Ghaihab Hassan, et al.
Published: (2024)
by: Adday, Ghaihab Hassan, et al.
Published: (2024)
FuMAM: fuzzy-based mobile agent migration approach for data gathering in wireless sensor networks
by: Qadori, Huthiafa Q., et al.
Published: (2018)
by: Qadori, Huthiafa Q., et al.
Published: (2018)
Wireless sensor security issues on data link layer: a survey
by: Zulkifl Hasan, Muhammad, et al.
Published: (2023)
by: Zulkifl Hasan, Muhammad, et al.
Published: (2023)
Multi-mobile agent itinerary planning algorithms for data gathering in wireless sensor networks: a review paper
by: Qadori, Huthiafa Q., et al.
Published: (2017)
by: Qadori, Huthiafa Q., et al.
Published: (2017)
A spawn mobile agent itinerary planning approach for energy-efficient data gathering in wireless sensor networks
by: Q. Qadori, Huthiafa, et al.
Published: (2017)
by: Q. Qadori, Huthiafa, et al.
Published: (2017)
Similar Items
-
A survey of sybil attack countermeasures in underwater sensor and acoustic networks
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2023) -
Energy trust system for detecting sybil attack in clustered wireless sensor networks
by: Alsaedi, Noor, et al.
Published: (2015) -
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016) -
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
by: Alsaedi, Noor, et al.
Published: (2017) -
Impact of blackhole and Sybil attacks on dynamic windows secured implicit geographic forwarding routing protocol
by: Mohd Hanapi, Zurina, et al.
Published: (2014)