Sybil attacks on identity-augmented Proof-of-Stake

2021 ◽  
Vol 199 ◽  
pp. 108424
Author(s):  
Moritz Platt ◽  
Peter McBurney
Keyword(s):  
2010 ◽  
Vol 18 (3) ◽  
pp. 885-898 ◽  
Author(s):  
Haifeng Yu ◽  
Phillip B. Gibbons ◽  
Michael Kaminsky ◽  
Feng Xiao

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 27629-27636 ◽  
Author(s):  
Yali Yuan ◽  
Liuwei Huo ◽  
Zhixiao Wang ◽  
Dieter Hogrefe

Author(s):  
Christina Roseline ◽  
Blessy Antony ◽  
Bijitha Balakrishnan ◽  
C. V. Chaithra ◽  
P. V. Bhavyasree

Author(s):  
Ambika Nagaraj

Sensor networks are playing an important role in many applications. These networks mainly used as monitoring tool are deployed in harsh and unsupervised environment. Hence securing these nodes and the data which is being transmitted becomes a basic requirement. To adapt security to the network, the study uses cluster-based arrangement of nodes. The encryption key is generated based on location, which enhances security by incorporating authentication, reliability and confidentiality of data. The packets are being analysed for its fidelity by the nodes which fall in path of the base station. Compared to the previous contributions certain amount of energy is conserved. Addition to this procedure, the data can be retrieved if modified by the adversary. The scheme enhances the security against sinkhole, wormhole and Sybil attacks.


Sign in / Sign up

Export Citation Format

Share Document