Home > Published Issues > 2008 > Volume 3, No. 1, January 2008 >

Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks

Shiuh-Jeng Wang 1, Yuh-Ren Tsai 2, and Chung-Wei Chen 2
1. Department of Information Management Central Police University Taoyuan, Taiwan 333
2. Institute of Communications Engineering National Tsing Hua University 101, Sec. 2, Kuang-Fu Rd., Hsinchu 300, Taiwan

Abstract—We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom scheme. The attacker needs to compromise the specified number of nodes to compromise the whole systems. Furthermore, our scheme which provides a stronger relationship between ID and key would make authentication more reliable and resistant against the Sybil attacks.

Index Terms - Ad hoc networks, Authentication, Sybil attack

Cite:Shiuh-Jeng Wang, Yuh-Ren Tsai and Chung-Wei Chen , "Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks," Journal of Communications, vol. 3, no.1, pp.20-26, 2008. Doi: 10.4304/jcm.3.1.20-26