Please use this identifier to cite or link to this item:
http://www.ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6633| Title: | A Key Pool Approach to Prevent a Sybil Attack in Wireless Sensor Networks |
| Authors: | Singh, Aditi Nandan Sharma, Sarthak Vasudeva, Amol [Guided by] |
| Keywords: | Fabricated identity Sybil attack |
| Issue Date: | 2017 |
| Publisher: | Jaypee University of Information Technology, Solan, H.P. |
| Abstract: | Sybil attack was first introduced by J. R. Douceur. According to him, the Sybil attack is an attack in which a single node can rule in the system by presenting multiple fake identities and behaving like multiple legitimate nodes[8]. |
| URI: | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6633 |
| Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Key Pool Approach to Prevent a Sybil Attack in Wireless Sensor Networks.pdf | 1.98 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.