JOURNAL OF COMMUNICATIONS (JCM)
ISSN : 1796-2021
Volume : 3 Issue : 1 Date : January 2008
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks
Shiuh-Jeng Wang, Yuh-Ren Tsai, and Chung-Wei Chen
Full Text: PDF (378 KB)
We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this
scheme, the authority pre-distributes the combination of the secret used in the Blom scheme. The
attacker needs to compromise the specified number of nodes to compromise the whole systems.
Furthermore, our scheme which provides a stronger relationship between ID and key would make
authentication more reliable and resistant against the Sybil attacks.
Ad hoc networks, Authentication, Sybil attack