K Priyadharshini, K Mohanapriya, P Muthulakshmi… - academia.edu
… For location-based services, these attacks as doable as a … We start by looking at the limits of
the large-scale Sybil attacks … device location authentication, our proposed defense is a Sybil …