Sciweavers

JCM
2008

Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks

13 years 11 months ago
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks
We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom scheme. The attacker needs to compromise the specified number of nodes to compromise the whole systems. Furthermore, our scheme which provides a stronger relationship between ID and key would make authentication more reliable and resistant against the Sybil attacks.
Shiuh-Jeng Wang, Yuh-Ren Tsai, Chung-Wei Chen
Added 13 Dec 2010
Updated 13 Dec 2010
Type Journal
Year 2008
Where JCM
Authors Shiuh-Jeng Wang, Yuh-Ren Tsai, Chung-Wei Chen
Comments (0)