{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T17:08:15Z","timestamp":1776186495990,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,12,15]],"date-time":"2018-12-15T00:00:00Z","timestamp":1544832000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s11277-018-6107-5","type":"journal-article","created":{"date-parts":[[2018,12,15]],"date-time":"2018-12-15T07:16:08Z","timestamp":1544858168000},"page":"145-173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["A Novel Model of Sybil Attack in Cluster-Based Wireless Sensor Networks and Propose a Distributed Algorithm to Defend It"],"prefix":"10.1007","volume":"105","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3116-4919","authenticated-orcid":false,"given":"Mojtaba","family":"Jamshidi","sequence":"first","affiliation":[]},{"given":"Ehsan","family":"Zangeneh","sequence":"additional","affiliation":[]},{"given":"Mehdi","family":"Esnaashari","sequence":"additional","affiliation":[]},{"given":"Aso Mohammad","family":"Darwesh","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Meybodi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,15]]},"reference":[{"key":"6107_CR1","unstructured":"Muthukumaran, K., Chitra, K., & Selvakumar, C. (2017). An energy efficient clustering scheme using multilevel routing for wireless sensor network. Computers & Electrical Engineering (in press)."},{"key":"6107_CR2","doi-asserted-by":"crossref","unstructured":"Douceur, J. R. (2002). The Sybil attack. First international workshop on peer-to-peer systems (IPTPS \u201802).","DOI":"10.1007\/3-540-45748-8_24"},{"issue":"3","key":"6107_CR3","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1016\/j.jcss.2013.06.017","volume":"80","author":"M Conti","year":"2014","unstructured":"Conti, M., Pietro, D. R., & Spognardi, A. (2014). Clone wars: Distributed detection of clone attacks in mobile WSNs. Journal of Computer and System Sciences, 80(3), 654\u2013669.","journal-title":"Journal of Computer and System Sciences"},{"issue":"3","key":"6107_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1016\/j.jcss.2013.06.016","volume":"80","author":"H Shafiei","year":"2014","unstructured":"Shafiei, H., Khonsari, A., Derakhshi, H., & Mousavi, P. (2014). Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences, 80(3), 644\u2013653.","journal-title":"Journal of Computer and System Sciences"},{"issue":"2","key":"6107_CR5","first-page":"299","volume":"1","author":"KC And","year":"2003","unstructured":"And, K. C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. AdHoc Networks, 1(2), 299\u2013302.","journal-title":"AdHoc Networks"},{"key":"6107_CR6","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.jnca.2018.01.004","volume":"105","author":"G Liu","year":"2018","unstructured":"Liu, G., Yan, Z., & Pedrycz, W. (2018). Data collection for attack detection and security measurement in mobile ad hoc networks: A survey. Journal of Network and Computer Applications, 105, 105\u2013122.","journal-title":"Journal of Network and Computer Applications"},{"key":"6107_CR7","doi-asserted-by":"crossref","unstructured":"Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The Sybil attack in sensor networks: Analysis and defenses. In International symposium on information processing in sensor networks (pp. 259\u2013268).","DOI":"10.1145\/984622.984660"},{"key":"6107_CR8","doi-asserted-by":"crossref","unstructured":"Chen, S., Yang, G., & Chen, S. (2010). A security routing mechanism against Sybil attack for wireless sensor networks. In International conference on communications and mobile computing (pp. 142\u2013146).","DOI":"10.1109\/CMC.2010.265"},{"key":"6107_CR9","unstructured":"Jangra, A., & Priyanka, S. (2011). Securing LEACH protocol from Sybil attack using jakes channel scheme (JCS). In International conferences on advances in ICT for emerging regions (ICTer)."},{"issue":"5","key":"6107_CR10","doi-asserted-by":"publisher","first-page":"135","DOI":"10.5121\/ijnsa.2012.4511","volume":"4","author":"A Vasudeva","year":"2012","unstructured":"Vasudeva, A., & Sood, M. (2012). Sybil attack on lowest id clustering algorithm in the mobile ad hoc network. International Journal of Network Security & Its Applications, 4(5), 135\u2013147.","journal-title":"International Journal of Network Security & Its Applications"},{"key":"6107_CR11","unstructured":"Zhong, S., Li, L., Liu, Y. G., & Yang, Y. R. (2004). Privacy-preserving location based services for mobile users in wireless networks. Technical report YALEU\/DCS\/TR-1297, Yale Computer Science."},{"key":"6107_CR12","doi-asserted-by":"crossref","unstructured":"Demirbas, M., & Song, Y. (2006). An RSSI-based scheme for Sybil attack detection in wireless sensor networks. In International symposium on world of wireless, mobile and multimedia networks (pp. 564\u2013570).","DOI":"10.1109\/WOWMOM.2006.27"},{"issue":"18","key":"6107_CR13","doi-asserted-by":"publisher","first-page":"3042","DOI":"10.1016\/j.comnet.2009.07.013","volume":"53","author":"KF Ssu","year":"2009","unstructured":"Ssu, K. F., Wang, W. T., & Chang, W. C. (2009). Detecting Sybil attacks in wireless sensor networks using neighboring information. Computer Networks, 53(18), 3042\u20133056.","journal-title":"Computer Networks"},{"issue":"7","key":"6107_CR14","doi-asserted-by":"publisher","first-page":"973","DOI":"10.3844\/jcssp.2011.973.979","volume":"7","author":"S Ramachandran","year":"2011","unstructured":"Ramachandran, S., & Shanmugan, V. (2011). Impact of Sybil and wormhole attacks in location based geographic multicast routing protocol for wireless sensor networks. Journal of Computer Science, 7(7), 973\u2013979.","journal-title":"Journal of Computer Science"},{"key":"6107_CR15","doi-asserted-by":"crossref","unstructured":"Misra, S., & Myneni, S. (2010). On identifying power control performing Sybil nodes in wireless sensor networks using RSSI. In InGlobal telecommunications conference (pp. 1\u20135).","DOI":"10.1109\/GLOCOM.2010.5683728"},{"key":"6107_CR16","doi-asserted-by":"crossref","unstructured":"Muraleedharan, R., Ye, X., & Osadciw, L. A. (2008). Prediction of Sybil attack on WSN using bayesian network and swarm intelligence. In Wireless sensing and processing, Orlando, FL, USA.","DOI":"10.1117\/12.778219"},{"issue":"1","key":"6107_CR17","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/s11741-008-0113-2","volume":"12","author":"M Wen","year":"2008","unstructured":"Wen, M., Li, H., & Zheng, Y.-F. (2008). TDOA-based Sybil attack detection scheme for wireless sensor. Journal of Shanghai University, 12(1), 66\u201370.","journal-title":"Journal of Shanghai University"},{"issue":"5","key":"6107_CR18","first-page":"1847","volume":"27","author":"Y Zhang","year":"2010","unstructured":"Zhang, Y., Fan, K. F., Zhang, S. B., & Mo, W. (2010). AOA based trust evaluation scheme for Sybil attack detection in WSN. Journal on Application Research of Computers, 27(5), 1847\u20131849.","journal-title":"Journal on Application Research of Computers"},{"issue":"12","key":"6107_CR19","first-page":"1803","volume":"20","author":"KR Butler","year":"2007","unstructured":"Butler, K. R., Ryu, S., Traynor, P., & McDaniel, P. D. (2007). Leveraging identity-based cryptography for node ID assignment in structured P2P systems. Advanced Information Networking and Application Workshops, 20(12), 1803\u20131815.","journal-title":"Advanced Information Networking and Application Workshops"},{"key":"6107_CR20","doi-asserted-by":"crossref","unstructured":"Li, F., Mittal, P., Caesar, M., & Borisov N. (2012). Sybil control: Practical Sybil defense with computational puzzles. In Seventh ACM workshop on Scalable trusted computing (pp. 67\u201368).","DOI":"10.1145\/2382536.2382548"},{"key":"6107_CR21","first-page":"13","volume":"29","author":"F Taol","year":"2008","unstructured":"Taol, F., & Ma, J.-F. (2008). New approach against Sybil attack in wireless sensor networks. Tongxin Xuebao\/Journal on Communications, 29,\u00a013\u201319.","journal-title":"Tongxin Xuebao\/Journal on Communications"},{"key":"6107_CR22","unstructured":"Zhang, Q., Wang, P., Reeves, D., & Ning, P. (2005). Defending against Sybil attacks in sensor networks. In Second international workshop on security in distributed computing systems (pp. 85\u2013191)."},{"key":"6107_CR23","doi-asserted-by":"crossref","unstructured":"Wang, J., Yang, G., Sun, Y., & Chen, S. (2007). Sybil attack detection based on RSSI for wireless sensor network. In International conference on wireless communications, networking and mobile computing (pp. 2684\u20132687).","DOI":"10.1109\/WICOM.2007.667"},{"key":"6107_CR24","unstructured":"Yang, J., Chen, Y., & Trappe, W. (2008). Detecting Sybil attack in wireless and sensor networks using cluster analysis. In 5th IEEE international conference on mobile ad hoc and sensor systems. Atlanta, GA (pp. 834\u2013839)."},{"key":"6107_CR25","first-page":"47","volume":"15","author":"X-D Wang","year":"2009","unstructured":"Wang, X.-D., Sun, Y.-Q., & Meng, X.-X. (2009). Cluster-based defending mechanism for Sybil attacks in wireless sensor network. Computer Engineering, 15, 47.","journal-title":"Computer Engineering"},{"key":"6107_CR26","first-page":"318","volume":"1","author":"JM Ahmad","year":"2015","unstructured":"Ahmad, J. M., Nanda, P., He, X., & Liu, R. P. (2015). A Sybil attack detection scheme for a centralized clustering-based hierarchical network. Trustcom\/BigDataSE\/ISPA, 1, 318\u2013325.","journal-title":"Trustcom\/BigDataSE\/ISPA"},{"issue":"5","key":"6107_CR27","doi-asserted-by":"publisher","first-page":"15","DOI":"10.14257\/ijgdc.2014.7.5.02","volume":"7","author":"S Sweety","year":"2014","unstructured":"Sweety, S., & Sejwar, V. (2014). Sybil attack detection and analysis of energy consumption in cluster based sensor networks. International Journal of Grid and Distributed Computing, 7(5), 15\u201330.","journal-title":"International Journal of Grid and Distributed Computing"},{"issue":"1","key":"6107_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/fi10010001","volume":"10","author":"SR Almas","year":"2017","unstructured":"Almas, S. R., Faez, K., Eshghi, F., & Kelarestaghi, M. (2017). A new lightweight watchdog-based algorithm for detecting Sybil nodes in mobile WSNs. Future Internet, 10(1), 1\u201317.","journal-title":"Future Internet"},{"issue":"11","key":"6107_CR29","first-page":"90","volume":"16","author":"S Rupinder","year":"2016","unstructured":"Rupinder, S., Singh, J., & Singh, R. (2016). TBSD: A defend against Sybil attack in wireless sensor networks. International Journal of Computer Science and Network Security, 16(11), 90.","journal-title":"International Journal of Computer Science and Network Security"},{"issue":"1","key":"6107_CR30","first-page":"13","volume":"1","author":"US Dhamodharan","year":"2015","unstructured":"Dhamodharan, U. S., & Vayanaperumal, R. (2015). Detecting and preventing Sybil attacks in wireless sensor networks using message authentication and passing method. The Scientific World Journal, 1(1), 13\u201317.","journal-title":"The Scientific World Journal"},{"issue":"1","key":"6107_CR31","first-page":"236","volume":"67","author":"R Amuthavalli","year":"2014","unstructured":"Amuthavalli, R., & Bhuvaneswaran, R. S. (2014). Detection and prevention of Sybil attack in wireless sensor network employing random password comparison method. Journal of Theoretical & Applied Information Technology, 67(1), 236\u2013246.","journal-title":"Journal of Theoretical & Applied Information Technology"},{"issue":"9","key":"6107_CR32","first-page":"3738","volume":"9","author":"W Shi","year":"2015","unstructured":"Shi, W., Liu, S., & Zhang, Z. (2015). A lightweight detection mechanism against Sybil attack in wireless sensor network. KSII Transactions on Internet & Information Systems, 9(9), 3738\u20133749.","journal-title":"KSII Transactions on Internet & Information Systems"},{"issue":"1","key":"6107_CR33","first-page":"602","volume":"11","author":"S Sinha","year":"2014","unstructured":"Sinha, S., Paul, A., & Pal, S. (2014). Use of spline curve in Sybil attack detection based on received signal power-new approach. International Journal on Recent Trends in Engineering & Technology, 11(1), 602\u2013611.","journal-title":"International Journal on Recent Trends in Engineering & Technology"},{"issue":"9","key":"6107_CR34","doi-asserted-by":"crossref","first-page":"1359","DOI":"10.17485\/ijst\/2014\/v7i9.23","volume":"7","author":"R Rafeh","year":"2014","unstructured":"Rafeh, R., & Khodadadi, M. (2014). Detecting Sybil nodes in wireless sensor networks using two-hop messages. Indian Journal of Science and Technology, 7(9), 1359\u20131368.","journal-title":"Indian Journal of Science and Technology"},{"issue":"21","key":"6107_CR35","doi-asserted-by":"publisher","first-page":"7560","DOI":"10.1016\/j.eswa.2015.05.057","volume":"42","author":"S Panagiotis","year":"2015","unstructured":"Panagiotis, S., Karapistoli, E., & Economides, A. (2015). Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information. Expert Systems with Applications, 42(21), 7560\u20137572.","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"6107_CR36","first-page":"744","volume":"43","author":"R-H Hu","year":"2015","unstructured":"Hu, R.-H., Dong, X.-M., & Wang, D.-L. (2015). Defense mechanism against node replication attacks and sybil attacks in wireless sensor networks. Acta Electronica Sinica, 43(4), 744\u2013752.","journal-title":"Acta Electronica Sinica"},{"key":"6107_CR37","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/j.compeleceng.2016.12.011","volume":"64","author":"M Jamshidi","year":"2017","unstructured":"Jamshidi, M., Zangeneh, E., Esnaashari, M., & Meybodi, M. R. (2017). A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks. Computers & Electrical Engineering, 64, 220\u2013232.","journal-title":"Computers & Electrical Engineering"},{"issue":"3","key":"6107_CR38","doi-asserted-by":"publisher","first-page":"159","DOI":"10.30630\/joiv.2.3.131","volume":"2","author":"M Jamshidi","year":"2018","unstructured":"Jamshidi, M., Ranjbari, M., Esnaashari, M., Qader, N. N., & Meybodi, M. R. (2018). Sybil node detection in mobile wireless sensor networks using observer nodes. International Journal on Informatics Visualization, 2(3), 159\u2013165.","journal-title":"International Journal on Informatics Visualization"},{"key":"6107_CR39","unstructured":"Yale, P. B. (1968). Geometry and symmetry. Holden-Day."},{"key":"6107_CR40","unstructured":"JSIM Simulator. https:\/\/sites.google.com\/site\/jsimofficial\/ . Accessed March 21, 2017."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-6107-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-6107-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-6107-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T22:36:34Z","timestamp":1605652594000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-6107-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,15]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["6107"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-6107-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,15]]},"assertion":[{"value":"15 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}