Skip to main content

Table 1 Notations for problem statement

From: A novel Sybil attack detection scheme in mobile IoT based on collaborate edge computing

\(u_i\)

A normal member node or a malicious node

\(e_{j}\)

The j-th edge node

V

The set of all nodes

\(V_{n}\)

Normal nodes set

\(V_{m}\)

Malicious nodes set

\(V_{u}\)

\(V_{n}\) \(\cup\) \(V_{m}\)

\(V_{e}\)

Edge nodes set

\(d_{j}^{i}\)

Distance between node \(u_i\) and edge node \(e_{j}\)

\(R_{j}^{ir}\)

RSSI value from \(u_i\) to \(e_{j}\) in the r-th round, r=1, 2

\(\eta _{r}\)

The ratio got in the r-th round, r=1, 2

\(v_{i}\)

The speed of \(u_i\)