2024-08-20
2024-07-22
2024-06-20
Abstract—We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom scheme. The attacker needs to compromise the specified number of nodes to compromise the whole systems. Furthermore, our scheme which provides a stronger relationship between ID and key would make authentication more reliable and resistant against the Sybil attacks.
Index Terms - Ad hoc networks, Authentication, Sybil attack
Cite:Shiuh-Jeng Wang, Yuh-Ren Tsai and Chung-Wei Chen , "Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks," Journal of Communications, vol. 3, no.1, pp.20-26, 2008. Doi: 10.4304/jcm.3.1.20-26