Affordable Access

Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks

Authors
Publisher
ACADEMY PUBLISHER
Publication Date
Keywords
  • Ad Hoc Networks
  • Authentication
  • Sybil Attack

Abstract

We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom scheme. The attacker needs to compromise the specified number of nodes to compromise the whole systems. Furthermore, our scheme which provides a stronger relationship between ID and key would make authentication more reliable and resistant against the Sybil attacks.

There are no comments yet on this publication. Be the first to share your thoughts.