نتایج جستجو برای: wormhole and sybil attacks

تعداد نتایج: 16832654  

Journal: :EURASIP J. Wireless Comm. and Networking 2010
Honglong Chen Wei Lou Xice Sun Zhi Wang

Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the ...

Journal: :CoRR 2012
Nitish Balachandran Sugata Sanyal

----------------------------------------------------------------ABSTRACT------------------------------------------------------------------Any decentralised distributed network is particularly vulnerable to the Sybil attack wherein a malicious node masquerades as several different nodes, called Sybil nodes, simultaneously in an attempt to disrupt the proper functioning of the network. Such attac...

2012
Lei Jin Xuelian Long Hassan Takabi James B.D. Joshi

Sybil attacks and Identity Clone attacks (also known as Profile Cloning attacks) have become significant security and privacy concerns for online social network (OSN) systems integrated with reputation or evaluation mechanisms. In both attacks, adversaries first create multiple identities and then launch attacks to compromise reputation or evaluation mechanisms in OSN systems. In this paper, we...

2011
A. VANI D. Sreenivasa Rao

The infrastructure of a Mobile Ad hoc Network (MANET) has no routers for routing, and all nodes must share the same routing protocol to assist each other when transmitting messages. However, almost all common routing protocols at present consider performance as first priority, and have little defense capability against the malicious nodes. Many researches have proposed various protocols of high...

Journal: :Computers & Security 2010
Ming-Yang Su

The infrastructure of a Mobile Ad hoc Network (MANET) has no routers for routing, and all nodes must share the same routing protocol to assist each other when transmitting messages. However, almost all common routing protocols at present consider performance as first priority, and have little defense capability against the malicious nodes. Many researches have proposed various protocols of high...

2008
Hai Trong Vu Ajay Kulkarni Kamil Saraç Neeraj Mittal

Wormhole attack is a type of replay attack in wireless networks that has serious consequences and is hard to defend against. This is because the attacker does not need to modify packets or compromise wireless nodes. This paper introduces Wormeros, a new framework to detect wormhole attacks in wireless networks. The framework contains two phases namely suspicion and confirmation. Our solution do...

2011

This paper explores the fundamental limits of using only the structure of social networks to defend against sybil attacks. We derive the number of attack edges needed to foil sybil defenses based on each of the known statistical properties of social graphs: our results suggest that it may be impossible to use this properties to identify with high probability both sybil and honest nodes. We then...

Journal: :IEEE Transactions on Parallel and Distributed Systems 2012

2012
Aly M. El-Semary Mohamed M. A. Azim

The recent advancements in electronics and communications technology have enabled the extensive deployment of wireless sensor networks (WSNs) into a variety of areas including homeland security, military systems, industrial, and health care. WSNs are typically deployed in unattended, hostile and harsh environment which makes them subject to several attacks such as sinkhole, spoofing or Sybil, w...

2011
Ahmad Heidari

Wormhole attack is a Routing-Disruption Attack in ad hoc networks, those malicious nodes in these networks can bear wormhole attacks to make up a false scenario on neighbor discovery relations among mobile nodes. The attackers endanger the safety of ad hoc routing protocols with making a direct link, referred to as a wormhole tunnel, between malicious nodes. After building a wormhole tunnel, on...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید