{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:17:39Z","timestamp":1742397459405,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540893349"},{"type":"electronic","value":"9783540893356"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89335-6_8","type":"book-chapter","created":{"date-parts":[[2008,11,11]],"date-time":"2008-11-11T14:31:45Z","timestamp":1226413905000},"page":"63-78","source":"Crossref","is-referenced-by-count":4,"title":["Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks"],"prefix":"10.1007","author":[{"given":"Adnan","family":"Vora","sequence":"first","affiliation":[]},{"given":"Mikhail","family":"Nesterenko","sequence":"additional","affiliation":[]},{"given":"S\u00e9bastien","family":"Tixeuil","sequence":"additional","affiliation":[]},{"given":"Sylvie","family":"Dela\u00ebt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Douceur, J.: The sybil attack. In: IPTPS, Cambridge, MA, March 2002, vol.\u00a01, pp. 251\u2013260 (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"issue":"10","key":"8_CR2","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A. Wood","year":"2002","unstructured":"Wood, A., Stankovic, J.: Denial of service in sensor networks. IEEE Computer\u00a035(10), 54\u201362 (2002)","journal-title":"IEEE Computer"},{"issue":"2-3","key":"8_CR3","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/S1570-8705(03)00008-8","volume":"1","author":"C. Karlof","year":"2003","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks\u00a01(2-3), 293\u2013315 (2003)","journal-title":"Ad Hoc Networks"},{"issue":"3","key":"8_CR4","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L. Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Transactions on Programming Languages and Systems\u00a04(3), 382\u2013401 (1982)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Deng, J., Han, R., Mishra, S.: Security support for in-network processing in wireless sensor networks. In: SASN, pp. 83\u201393 (October 2003)","DOI":"10.1145\/986858.986870"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1145\/1352533.1352558","volume-title":"The first ACM conference on Wireless network security WiSec","author":"L. Martucci","year":"2008","unstructured":"Martucci, L., Kohlweiss, M., Andersson, C., Panchenko, A.: Self-certified sybil-free pseudonyms. In: The first ACM conference on Wireless network security WiSec, pp. 154\u2013159. ACM, New York (2008)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Parno, B., Perrig, A., Gligor, V.: Distributed detection of node replication attacks in sensor networks. In: IEEE Symposium on Security and Privacy, pp. 49\u201363 (May 2005)","DOI":"10.1109\/SP.2005.8"},{"issue":"2","key":"8_CR8","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/JSAC.2005.861390","volume":"24","author":"G. Theodorakopoulos","year":"2006","unstructured":"Theodorakopoulos, G., Baras, J.: On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications\u00a024(2), 318\u2013328 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Yang, H., Ye, F., Yuan, Y., Lu, S., Arbaugh, W.: Toward resilient security in wireless sensor networks. In: MobiHoc, pp. 34\u201345 (May 2005)","DOI":"10.1145\/1062689.1062696"},{"key":"8_CR10","unstructured":"Zhang, Q., Wang, P., Reeves, D., Ning, P.: Defending against sybil attacks in sensor networks. In: Second International Workshop on Security in Distributed Computing Systems, pp. 185\u2013191 (June 2005)"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., Jajodia, S.: LEAP - efficient security mechanisms for large-scale distributed sensor networks. In: SenSys., pp. 308\u2013309 (November 2003)","DOI":"10.1145\/948109.948120"},{"key":"8_CR12","unstructured":"Buchegger, S., Boudec, J.L.: A robust reputation system for mobile ad-hoc. Technical Report EPFL-IC-LCA-50, EPFL, Lausanne, Switzerland (November\u00a011, 2003)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Cheng, A., Friedman, E.: Sybilproof reputation mechanisms. In: P2PENCON, pp. 128\u2013132 (2005)","DOI":"10.1145\/1080192.1080202"},{"key":"8_CR14","unstructured":"Jelasity, M., Montresor, A., Babaoglu, O.: Towards secure epidemics: Detection and removal of malicious peers in epidemic-style protocols. Technical Report UBLCS-2003-14, University of Bologna (December\u00a011, 2003)"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis and defenses. In: IPSN, pp. 259\u2013268 (April 2004)","DOI":"10.1145\/984622.984660"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wireless Communications\u00a011(6) (December 2004)","DOI":"10.1109\/MWC.2004.1368895"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Demirbas, M., Song, Y.: An RSSI-based scheme for sybil attack detection in wireless sensor networks. In: WOWMOM, pp. 564\u2013570 (June 2006)","DOI":"10.1109\/WOWMOM.2006.27"},{"issue":"2","key":"8_CR18","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/JSAC.2005.861380","volume":"24","author":"S. Capkun","year":"2006","unstructured":"Capkun, S., Hubaux, J.P.: Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications\u00a024(2), 221\u2013232 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Kindberg, T., Zhang, K.: Validating and securing spontaneous associations between wireless devices. In: ISW: International Workshop on Information Security, Bristol, UK, pp. 44\u201353 (October 2003)","DOI":"10.1007\/10958513_4"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Lazos, L., Poovendran, R., \u010capkun, S.: ROPE: Robust position estimation in wireless sensor networks. In: IPSN, Los Angeles, CA, pp. 324\u2013331 (April 2005)","DOI":"10.1109\/IPSN.2005.1440942"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the ACM workshop on Wireless security, San Diego, CA, pp. 1\u201310 (2003)","DOI":"10.1145\/941311.941313"},{"issue":"4","key":"8_CR22","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1109\/TDSC.2006.57","volume":"3","author":"A. Vora","year":"2006","unstructured":"Vora, A., Nesterenko, M.: Secure location verification using radio broadcast. IEEE Transactions on Dependable and Secure Computing\u00a03(4), 369\u2013383 (2006)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Delat, S., Mandal, P.S., Rokicki, M., Tixeuil, S.: Deterministic Secure Positioning in Wireless Sensor Networks. In: DCOSS (June 2008) (to appear)","DOI":"10.1007\/978-3-540-69170-9_32"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Hwang, J., He, T., Kim, Y.: Detecting phantom nodes in wireless sensor networks. In: 26th IEEE Conference on Computer Communications InfoCom, pp. 2391\u20132395 (2007)","DOI":"10.1109\/INFCOM.2007.287"},{"key":"8_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/11780823_17","volume-title":"Structural Information and Communication Complexity","author":"M. Nesterenko","year":"2006","unstructured":"Nesterenko, M., Tixeuil, S.: Discovering network topology in the presence of byzantine faults. In: Flocchini, P., G\u0105sieniec, L. (eds.) SIROCCO 2006. LNCS, vol.\u00a04056, pp. 212\u2013226. Springer, Heidelberg (2006)"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Zhou, G., He, T., Krishnamurthy, S., Stankovic, J.: Impact of radio irregularity on wireless sensor networks. In: The 2nd International Conference on Mobile Systems, Applications, and Services MobiSys, pp. 125\u2013138 (June 2004)","DOI":"10.1145\/990064.990081"},{"issue":"2","key":"8_CR27","first-page":"225","volume":"43","author":"T. Chandra","year":"1996","unstructured":"Chandra, T., Toueg, S.: Unreliable failure detectors for reliable distributed systems. Communications of the ACM\u00a043(2), 225\u2013267 (1996)","journal-title":"Communications of the ACM"},{"issue":"4","key":"8_CR28","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1145\/234533.234549","volume":"43","author":"T. Chandra","year":"1996","unstructured":"Chandra, T., Hadzilacos, V., Toueg, S.: The weakest failure detector for solving consensus. Journal of the ACM\u00a043(4), 685\u2013722 (1996)","journal-title":"Journal of the ACM"},{"key":"8_CR29","volume-title":"Wireless communications - Principles and Practice","author":"T. Rappaport","year":"2002","unstructured":"Rappaport, T.: Wireless communications - Principles and Practice. Prentice-Hall, Englewood Cliffs (2002)"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Vora, A., Nesterenko, M., Tixeuil, S., Delaet, S.: Universe detectors for sybil defense in ad hoc wireless networks. Technical Report No 6529, INRIA (May 2008)","DOI":"10.1007\/978-3-540-89335-6_8"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89335-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,2]],"date-time":"2025-02-02T17:37:48Z","timestamp":1738517868000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89335-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540893349","9783540893356"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89335-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}