Retraction

Novel Sybil attack detection using RSSI and neighbour information to ensure secure communication in WSN

Retraction Details

Nature of Retraction:

Retraction

Retraction Notice:
10.1007/s12652-022-04070-x

Citations (27)

27
Total Citations
16
Post-Retraction
(59.3%)
11
Pre-Retraction
0
Same Day
Post-Retraction Citation Analysis
0 Within 30 days
6 Within 1 year
4 After 2+ years
940 Days since retraction (latest)
Lightweight Sybil attack detection framework for wireless sensor network with cluster topology
S. Venugopal, M. Auxilia, Vinodha Dhanusgodi
AIP conference proceedings
Published: Jan 2025
940 days after retraction
Security Challenges in Wireless Sensor Network: Current Status and Future Trends
G. Mohan Ram, E. Ilavarasan
Wireless Personal Communications
Published: Dec 2024
2 citations
915 days after retraction
Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: A Review
Ahmet Oztoprak, Reza Hassanpour, Aysegul Ozkan et al. (4 authors)
ACM Computing Surveys Open Access
Published: Dec 2024
7 citations
910 days after retraction
Review of threats and existing algorithmic solutions for securing WSNs
Michal Janovec, Jozef Papán, Michal Hraška
Unknown Journal
Published: Nov 2024
891 days after retraction
Sybil Attacks Detection and Traceability Mechanism Based on Beacon Packets in Connected Automobile Vehicles
Yaling Zhu, Jia Zeng, Fangchen Weng et al. (7 authors)
Sensors Open Access
Published: Mar 2024
5 citations
660 days after retraction
Paper citing Novel Sybil attack detection using RSSI and neighb...
Unknown Authors
Unknown Journal
Published: Feb 2024
625 days after retraction
IoT Architecture Layers
Fadele Ayotunde Alaba
Unknown Journal
Published: Jan 2024
574 days after retraction
Attacks, Challenges, and Countermeasures for an Integrating IoT Framework
Alaba Ayotunde Fadele
Unknown Journal
Published: Jan 2024
574 days after retraction
Enhancing Security in Healthcare IoT Systems: Mitigating Threats and Protecting Patient Data
Fatiha Benabderrahmane, Samir Selmane, Nardjes Bouchemal
Unknown Journal
Published: Dec 2023
560 days after retraction
Cross Layer Security Based Fuzzy Trust Calculation Mechanism (CLS-FTCM) with Deep Learning for Malicious Nodes Identification on WSN
Yuzhe Shang, Jian Zhou, Mengyao Li et al. (7 authors)
2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS)
Published: Jul 2023
1 citation
403 days after retraction
PrSLoc: Sybil attack detection for localization with private observers using differential privacy
Yachao Yuan, Yu Huang, Yali Yuan
Computers & Security
Published: May 2023
4 citations
337 days after retraction
Sybil Attack Detection in Internet of Flying Things-IoFT: A Machine Learning Approach
Donpiti Chulerttiyawong, Abbas Jamalipour
IEEE Internet of Things Journal Open Access
Published: Mar 2023
22 citations
283 days after retraction
Web3 Sybil avoidance using network latency
Quinten Stokkink, Can Umut Ileri, Dick Epema et al. (4 authors)
Computer Networks Open Access
Published: Mar 2023
4 citations
283 days after retraction
Wireless sensor network security: A recent review based on state-of-the-art works
Mohammed Faris, Mohd Nazri Mahmud, Mohd Fadzli Mohd Salleh et al. (4 authors)
International Journal of Engineering Business Management Open Access
Published: Feb 2023
51 citations
240 days after retraction
Survey on data aggregation based security attacks in wireless sensor network
Nikhath Tabassum, Geetha D. Devanagavi, Rajashekhar C. Biradar et al. (4 authors)
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering Open Access
Published: Jan 2023
2 citations
239 days after retraction
A systematic review of routing attacks detection in wireless sensor networks
Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin et al. (4 authors)
PeerJ Computer Science Open Access
Published: Oct 2022
16 citations
137 days after retraction
Web3 Sybil Avoidance Using Network Latency
Quinten Stokkink, Can Umut Ileri, Dick Epema et al. (4 authors)
SSRN Electronic Journal Open Access
Published: Jan 2022
156 days before retraction
Protecting Routing Data in WSNs with use of IOTA Tangle
Reza Soltani, Lovina Saxena, Rohit Joshi et al. (4 authors)
Procedia Computer Science Open Access
Published: Jan 2022
9 citations
156 days before retraction
Peer Review #2 of "A survey of Sybil attack countermeasures in IoT-based wireless sensor networks (v0.2)"
Jalal Al‐Muhtadi
Unknown Journal Open Access
Published: Sep 2021
257 days before retraction
Peer Review #1 of "A survey of Sybil attack countermeasures in IoT-based wireless sensor networks (v0.2)"
Akashah Arshad, Zurina Mohd Hanapi, Hanapi Corresp et al. (6 authors)
Unknown Journal Open Access
Published: Sep 2021
257 days before retraction
Peer Review #1 of "A survey of Sybil attack countermeasures in IoT-based wireless sensor networks (v0.1)"
Akashah Arshad, Zurina Mohd Hanapi, Hanapi Corresp et al. (6 authors)
Unknown Journal Open Access
Published: Sep 2021
257 days before retraction
A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
Akashah Arshad, Zurina Mohd Hanapi, Shamala Subramaniam et al. (4 authors)
PeerJ Computer Science Open Access
Published: Sep 2021
32 citations
257 days before retraction
Peer Review #2 of "A survey of Sybil attack countermeasures in IoT-based wireless sensor networks (v0.1)"
Jalal Al‐Muhtadi
Unknown Journal Open Access
Published: Sep 2021
257 days before retraction
Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review
Mohammad Sadegh Yousefpoor, Efat Yousefpoor, Hamid Barati et al. (6 authors)
Journal of Network and Computer Applications
Published: Jun 2021
86 citations
360 days before retraction
SAMP-RPL: secure and adaptive multipath RPL for enhanced security and reliability in heterogeneous IoT-connected low power and lossy networks
Somia Sahraoui, Nabil Henni
Journal of Ambient Intelligence and Humanized Computing
Published: May 2021
14 citations
393 days before retraction
A Novel Dynamic Authentication Method for Sybil Attack Detection and Prevention in Wireless Sensor Networks
Wadii Jlassi, Rim Haddad, Ridha Bouallègue et al. (4 authors)
Lecture notes in networks and systems
Published: Jan 2021
4 citations
521 days before retraction
Information-theoretic approach for secure localization against sybil attack in wireless sensor network
Arindam Giri, Subrata Dutta, Sarmistha Neogy
Journal of Ambient Intelligence and Humanized Computing
Published: Nov 2020
11 citations
560 days before retraction
Quick Stats
Total Citations: 27
Years Since Retraction: 3.5 years
Open Access: Yes
Last Checked: Jul 24, 2025
Related Papers
Identification, classification & grading of fruits using ma…
Journal of Ambient Intelligence and Humanized Computing • 71 citations
A clustering approach for attack detection and data transmi…
Network: Computation in Neural Systems • 6 citations
Secure prediction and assessment of sports injuries using d…
Journal of Ambient Intelligence and Humanized Computing • 91 citations
An optimised homomorphic CRT-RSA algorithm for secure and e…
Personal and Ubiquitous Computing • 30 citations
Applying Dynamic Systems to Social Media by Using Controlli…
Computational Intelligence and Neuroscience • 45 citations