{"id":"https://openalex.org/W2001733151","doi":"https://doi.org/10.1109/seccom.2007.4550372","title":"Sybil attack detection in a hierarchical sensor network","display_name":"Sybil attack detection in a hierarchical sensor network","publication_year":2007,"publication_date":"2007-01-01","ids":{"openalex":"https://openalex.org/W2001733151","doi":"https://doi.org/10.1109/seccom.2007.4550372","mag":"2001733151"},"language":"en","primary_location":{"id":"doi:10.1109/seccom.2007.4550372","is_oa":false,"landing_page_url":"https://doi.org/10.1109/seccom.2007.4550372","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102961198","display_name":"Jian Yin","orcid":"https://orcid.org/0000-0002-4820-0226"},"institutions":[{"id":"https://openalex.org/I20382870","display_name":"Missouri University of Science and Technology","ror":"https://ror.org/00scwqd12","country_code":"US","type":"education","lineage":["https://openalex.org/I20382870"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jian Yin","raw_affiliation_strings":["Department of Computer Science, University of Missouri, Rolla, USA","Department of Computer Science, University of Missouri - Rolla, 65401 USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Missouri, Rolla, USA","institution_ids":["https://openalex.org/I20382870"]},{"raw_affiliation_string":"Department of Computer Science, University of Missouri - Rolla, 65401 USA","institution_ids":["https://openalex.org/I20382870"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012569039","display_name":"Sanjay Madria","orcid":"https://orcid.org/0000-0002-2768-3660"},"institutions":[{"id":"https://openalex.org/I20382870","display_name":"Missouri University of Science and Technology","ror":"https://ror.org/00scwqd12","country_code":"US","type":"education","lineage":["https://openalex.org/I20382870"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sanjay Kumar Madria","raw_affiliation_strings":["Department of Computer Science, University of Missouri, Rolla, USA","Department of Computer Science, University of Missouri - Rolla, 65401 USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Missouri, Rolla, USA","institution_ids":["https://openalex.org/I20382870"]},{"raw_affiliation_string":"Department of Computer Science, University of Missouri - Rolla, 65401 USA","institution_ids":["https://openalex.org/I20382870"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102961198"],"corresponding_institution_ids":["https://openalex.org/I20382870"],"apc_list":null,"apc_paid":null,"fwci":2.2461,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.88416652,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"494","last_page":"503"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.7603706121444702},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7482062578201294},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7191876173019409},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5715010762214661},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5618109703063965},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44804370403289795},{"id":"https://openalex.org/keywords/sensor-node","display_name":"Sensor node","score":0.43491336703300476},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.4141797423362732},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3060275912284851},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.26984506845474243},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.16500228643417358},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.14268940687179565},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12967640161514282},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07826414704322815}],"concepts":[{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.7603706121444702},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7482062578201294},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7191876173019409},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5715010762214661},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5618109703063965},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44804370403289795},{"id":"https://openalex.org/C111185680","wikidata":"https://www.wikidata.org/wiki/Q3866206","display_name":"Sensor node","level":5,"score":0.43491336703300476},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.4141797423362732},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3060275912284851},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.26984506845474243},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.16500228643417358},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.14268940687179565},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12967640161514282},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07826414704322815},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/seccom.2007.4550372","is_oa":false,"landing_page_url":"https://doi.org/10.1109/seccom.2007.4550372","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.8999999761581421,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1500356409","https://openalex.org/W1520914943","https://openalex.org/W1656678770","https://openalex.org/W1977369221","https://openalex.org/W2005725110","https://openalex.org/W2013464622","https://openalex.org/W2033751220","https://openalex.org/W2048402311","https://openalex.org/W2098846072","https://openalex.org/W2112001075","https://openalex.org/W2113446256","https://openalex.org/W2114495437","https://openalex.org/W2126087831","https://openalex.org/W2128381560","https://openalex.org/W2133446951","https://openalex.org/W2139360482","https://openalex.org/W2144562869","https://openalex.org/W2146569905","https://openalex.org/W2151993488","https://openalex.org/W2158421323","https://openalex.org/W2165491783","https://openalex.org/W2169944676","https://openalex.org/W4241413379","https://openalex.org/W4250657897","https://openalex.org/W6636970380","https://openalex.org/W6678832241","https://openalex.org/W6680439515","https://openalex.org/W6681824290","https://openalex.org/W6684981138"],"related_works":["https://openalex.org/W1977342959","https://openalex.org/W2536494564","https://openalex.org/W2565425112","https://openalex.org/W2525537297","https://openalex.org/W2545116705","https://openalex.org/W2148549110","https://openalex.org/W28080522","https://openalex.org/W145760256","https://openalex.org/W1606544890","https://openalex.org/W1591611979"],"abstract_inverted_index":{"The":[0,37,158],"Sybil":[1,38,65,116,146],"attack":[2,39,66,147],"is":[3,120,222,228],"a":[4,12,71,86,109,124,144,152,165,194,205],"particularly":[5],"harmful":[6],"threat":[7],"to":[8,54,88,114],"sensor":[9,14,46,98,127,156,168,208,237],"networks":[10],"where":[11],"single":[13,72],"node":[15,22,30,202],"illegitimately":[16],"claims":[17],"multiple":[18,57,75,81],"identities.":[19],"A":[20],"malicious":[21],"may":[23],"generate":[24],"an":[25],"arbitrary":[26],"number":[27],"of":[28,44,101,130,180],"additional":[29],"identities":[31],"using":[32],"only":[33,172,192],"one":[34],"physical":[35],"device.":[36],"can":[40,67,161],"disrupt":[41,68],"normal":[42],"functioning":[43],"the":[45,50,56,64,80,97,102,131,174,178,181,189,212,232],"network,":[47,169],"such":[48],"as":[49],"multipath":[51],"routing,":[52],"used":[53,163],"explore":[55],"disjoint":[58],"paths":[59],"between":[60],"source-destination":[61],"pairs.":[62],"But":[63],"it":[69,119,171],"when":[70],"adversary":[73],"presents":[74],"identities,":[76,90],"which":[77,227],"appear":[78],"on":[79,151],"paths.":[82],"Digital":[83],"certificates":[84],"are":[85,93],"way":[87],"prove":[89],"but":[91,118],"they":[92],"not":[94,121],"suitable":[95,122],"for":[96,123,200],"network":[99,128],"because":[100,129],"large":[103,125,166,206],"computational":[104],"overheads.":[105],"Researchers":[106],"have":[107],"proposed":[108,159,190],"light-weight":[110,145],"identity":[111,217],"certificate":[112],"method":[113,149,160,191],"defeat":[115],"attacks,":[117],"scale":[126,167,207],"huge":[132],"memory":[133,196],"usage":[134],"required":[135],"at":[136,235],"each":[137,201,220,236],"node.":[138,238],"In":[139,210],"this":[140],"paper,":[141],"we":[142],"propose":[143],"detection":[148],"based":[150],"hierarchical":[153],"architecture":[154],"in":[155,164,204],"networks.":[157],"be":[162],"and":[170],"uses":[173],"symmetric":[175],"cryptography":[176],"avoiding":[177],"use":[179],"public":[182],"key":[183],"cryptography.":[184],"Simulation":[185],"results":[186],"show":[187],"that":[188],"needs":[193],"small":[195],"(below":[197,224],"140":[198],"KB)":[199],"(even":[203],"network).":[209],"addition,":[211],"energy":[213,234],"consumption":[214],"by":[215],"new":[216],"generations":[218],"within":[219],"group":[221],"low":[223],"60":[225],"mJ),":[226],"much":[229],"lower":[230],"than":[231],"available":[233]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
