From: A novel Sybil attack detection scheme in mobile IoT based on collaborate edge computing
\(u_i\) | A normal member node or a malicious node |
\(e_{j}\) | The j-th edge node |
V | The set of all nodes |
\(V_{n}\) | Normal nodes set |
\(V_{m}\) | Malicious nodes set |
\(V_{u}\) | \(V_{n}\) \(\cup\) \(V_{m}\) |
\(V_{e}\) | Edge nodes set |
\(d_{j}^{i}\) | Distance between node \(u_i\) and edge node \(e_{j}\) |
\(R_{j}^{ir}\) | RSSI value from \(u_i\) to \(e_{j}\) in the r-th round, r=1, 2 |
\(\eta _{r}\) | The ratio got in the r-th round, r=1, 2 |
\(v_{i}\) | The speed of \(u_i\) |