Detect the Sybil Attack by using GPSR Protocol
نویسندگان
چکیده
منابع مشابه
Efficient and Feasible Methods to Detect Sybil Attack in VANET
Large scale node to node systems face security threats from malfunction or hostile remote computing elements. Node to node system commonly relies on the existence of multiple independent remote entities to mitigate the threat of hostile nodes. Sometime single faulty node can produce various identities leading to control of substantial fraction of the system. These attacks are called Sybil attac...
متن کاملA Novel Approach to Detect Sybil Attack in VANET
Vehicular Ad-hoc Network (VANET) is vulnerable to many security threats including Sybil attack due to its open infrastructure. In this paper we have proposed a scheme to detect Sybil attacks using Digital Signature. The infrastructure needed includes vehicles, Road Side Units (RSUs) and Department of Motor Vehicle (DMV). In Sybil attack the malicious node, called Sybil attacker, illegally claim...
متن کاملThe Sybil Attack
Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these “Sybil attacks” is to have a trusted ag...
متن کاملSecure Authentication Protocol to Detect Sybil Attacks in MANETs
Mobile ad-hoc networks (MANETs) are well known to be susceptible to various attacks, due to features such as lack of centralized control, dynamic topology, limited physical security and energy constrained operations. In this paper, we focus on preventing Sybil attack and Intruder nodes (malicious node). We are presenting a novel and secure authentication of nodes as soon as they comes in to the...
متن کاملAn Efficient Method to Detect Sybil Attack using Trust based Model
Sybil attack is one of the most severe attacks in the vast domain of ad-hoc network. Mobile Ad-hoc Network (MANET) has to face this attack in its different application areas due to its inherent properties like mobility, absence of centralized infrastructure and limited resources. In this paper the threats of Sybil attacks in different environment of MANET is discussed briefly and taxonomy of va...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2016
ISSN: 0975-8887
DOI: 10.5120/ijca2016910461