Defending Sybil attack using Associate Membership method in Distributed P2P Network
نویسندگان
چکیده
منابع مشابه
Distributed Sybil Attack Detection in VANET
Security and Privacy are among the most important concerns in Vehicular Ad-hoc Networks (VANET). Widely accepted privacy preserving communication scheme in VANETcommunity -that is using pseudonyms –has left open doors for some security problems such as Sybil attack. In this paper, we have proposed an efficient approach detecting this attack while preserving privacy of vehicles in the network.
متن کاملDefending Against Sybil Attacks in Sensor Networks using Pre-Distributed key
A wireless sensor network is a collaborative network in which nodes perform their sensing task in one hand, and function as relay for transferring the data of other nodes on the other hand if necessary. It consists of many inexpensive wireless nodes, each having sensing capability with some computational and communication power. As sensor networks are coming to be of wide-spread deployment, sec...
متن کاملDefending against Sybil Nodes in BitTorrent
BitTorrent and its derivatives contribute a major portion of Internet traffic due to their simple and scalable operation. However, the lack of security mechanisms makes them vulnerable to attacks such as file piece pollution, connection slot consumption, and bandwidth exhaustion. These effects are made worse by the ability of attackers to manufacture new identities, or Sybil nodes, at will. The...
متن کاملSybilDefense: Defending Sybil attacks using techniques from Complex Systems
Web 2.0 applications and websites towards social news, gaming and networking are particularly vulnerable to Sybil attacks. In a Sybil attack, a malicious user assumes many fake identities, and pretends to be multiple honest users in the system. By controlling a certain fraction of the nodes in the system, he out votes the honest users to promote his own news articles, which poses a threat to th...
متن کاملA Distributed Denial-of-Service(DDoS) Attack using BitTorrent Peer-to-Peer(P2P) Network
Recently, many hackers attacks are done with a distributed denial of service (DDoS) strategy. Most famous centralized peer to peer (P2P) networks can be easily used for realize these attacks. File-sharing protocols such BitTorrent or an extension of Gnutella use centralized server for orchestrate 7-level connections between peers. This procedure create a point-of-failure because malicious centr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOSR Journal of Computer Engineering
سال: 2013
ISSN: 2278-8727,2278-0661
DOI: 10.9790/0661-0867982