{"id":"https://openalex.org/W3036856955","doi":"https://doi.org/10.1109/icccs49078.2020.9118478","title":"A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks","display_name":"A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks","publication_year":2020,"publication_date":"2020-05-01","ids":{"openalex":"https://openalex.org/W3036856955","doi":"https://doi.org/10.1109/icccs49078.2020.9118478","mag":"3036856955"},"language":"en","primary_location":{"id":"doi:10.1109/icccs49078.2020.9118478","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs49078.2020.9118478","pdf_url":null,"source":{"id":"https://openalex.org/S4306498617","display_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100678679","display_name":"Hui Wang","orcid":"https://orcid.org/0000-0003-0493-185X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hui Wang","raw_affiliation_strings":["Department of Mathematics and Computer Engineering, Ordos Institute of Technology, Ordos, China"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Engineering, Ordos Institute of Technology, Ordos, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100647267","display_name":"Li Ma","orcid":"https://orcid.org/0000-0003-2507-4586"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li Ma","raw_affiliation_strings":["Department of Mathematics and Computer Engineering, Ordos Institute of Technology, Ordos, China"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Engineering, Ordos Institute of Technology, Ordos, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046530807","display_name":"Hongying Bai","orcid":"https://orcid.org/0000-0002-4345-7647"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hong-ying Bai","raw_affiliation_strings":["Department of Mathematics and Computer Engineering, Ordos Institute of Technology, Ordos, China"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Engineering, Ordos Institute of Technology, Ordos, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100678679"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2777,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.41341579,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"752","last_page":"756"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.9085610508918762},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.715327262878418},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7126674652099609},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6989207863807678},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6673761606216431},{"id":"https://openalex.org/keywords/sensor-node","display_name":"Sensor node","score":0.4668278098106384},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.45711660385131836},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.42970770597457886},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.39390289783477783},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32749059796333313},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.32011207938194275},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14888864755630493},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09151306748390198}],"concepts":[{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.9085610508918762},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.715327262878418},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7126674652099609},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6989207863807678},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6673761606216431},{"id":"https://openalex.org/C111185680","wikidata":"https://www.wikidata.org/wiki/Q3866206","display_name":"Sensor node","level":5,"score":0.4668278098106384},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.45711660385131836},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.42970770597457886},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.39390289783477783},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32749059796333313},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.32011207938194275},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14888864755630493},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09151306748390198},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccs49078.2020.9118478","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs49078.2020.9118478","pdf_url":null,"source":{"id":"https://openalex.org/S4306498617","display_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1551333318","https://openalex.org/W1931876811","https://openalex.org/W1967919565","https://openalex.org/W2008997117","https://openalex.org/W2106335692","https://openalex.org/W2110221314","https://openalex.org/W2137816628","https://openalex.org/W2415968599","https://openalex.org/W2948057225","https://openalex.org/W4253180268"],"related_works":["https://openalex.org/W2540218377","https://openalex.org/W2799361348","https://openalex.org/W1977342959","https://openalex.org/W2053773563","https://openalex.org/W2148549110","https://openalex.org/W2564820291","https://openalex.org/W2067121920","https://openalex.org/W2371193381","https://openalex.org/W2545116705","https://openalex.org/W1536182396"],"abstract_inverted_index":{"Wireless":[0],"sensor":[1,26,148],"network":[2,9,103,194],"(WSN)":[3],"is":[4,56,68,82,180],"a":[5,22,31,83,135],"wireless":[6],"self-organizing":[7],"multi-hop":[8],"that":[10,118,188],"can":[11,107],"sense":[12],"and":[13,34,47,65,67,73,160,196],"collect":[14],"the":[15,18,36,40,44,52,76,90,119,123,140,144,158,166,171,176,199],"information":[16,38],"of":[17,25,201],"monitored":[19],"environment":[20],"through":[21,157],"certain":[23,32],"number":[24],"nodes":[27,95,156],"which":[28,93],"deployed":[29],"in":[30,58,92,102,114,143],"area":[33],"transmit":[35],"collected":[37],"to":[39,43,71,75,89,100,112],"client.":[41],"Due":[42],"limited":[45],"power":[46],"data":[48,63,115,120],"capacity":[49],"stored":[50],"by":[51,122,175],"micro":[53],"sensor,":[54],"it":[55],"weak":[57],"communication":[59],"with":[60],"other":[61],"nodes,":[62],"storage":[64],"calculation,":[66],"very":[69],"vulnerable":[70],"attack":[72,81,87,91],"harm":[74],"entire":[77],"network.":[78],"The":[79,184],"Sybil":[80,86,141,155,172,182,202],"classic":[84],"example.":[85],"refers":[88],"malicious":[94],"forge":[96,108],"multiple":[97,109],"node":[98,110,142,149,163,173,203],"identities":[99,111],"participate":[101,113],"operation.":[104],"Malicious":[105],"attackers":[106],"forwarding.":[116],"So":[117],"obtained":[121],"end":[124],"user":[125],"without":[126],"any":[127],"use":[128],"value.":[129],"In":[130],"this":[131],"paper,":[132],"we":[133],"propose":[134],"three-tier":[136],"detection":[137],"scheme":[138,191],"for":[139],"severe":[145],"environment.":[146],"Every":[147],"will":[150],"determine":[151],"whether":[152,170],"they":[153],"are":[154],"first-level":[159],"second-level":[161],"high-energy":[162],"detection.":[164,204],"Finally,":[165],"base":[167],"station":[168],"determines":[169],"detected":[174],"first":[177],"two":[178],"stages":[179],"true":[181],"node.":[183],"simulation":[185],"results":[186],"show":[187],"our":[189],"proposed":[190],"significantly":[192],"improves":[193,198],"lifetime,":[195],"effectively":[197],"accuracy":[200]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2025-10-10T00:00:00"}
