Please use this identifier to cite or link to this item:
                
    
    http://www.ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6633| Title: | A Key Pool Approach to Prevent a Sybil Attack in Wireless Sensor Networks | 
| Authors: | Singh, Aditi Nandan Sharma, Sarthak Vasudeva, Amol [Guided by]  | 
| Keywords: | Fabricated identity Sybil attack  | 
| Issue Date: | 2017 | 
| Publisher: | Jaypee University of Information Technology, Solan, H.P. | 
| Abstract: | Sybil attack was first introduced by J. R. Douceur. According to him, the Sybil attack is an attack in which a single node can rule in the system by presenting multiple fake identities and behaving like multiple legitimate nodes[8]. | 
| URI: | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6633 | 
| Appears in Collections: | B.Tech. Project Reports | 
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Key Pool Approach to Prevent a Sybil Attack in Wireless Sensor Networks.pdf | 1.98 MB | Adobe PDF | View/Open | 
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.