نتایج جستجو برای: sybil attack
تعداد نتایج: 80969 فیلتر نتایج به سال:
Recent solutions to defend against the Sybil attack, in which a node generates multiple identities, using social networks. In these solutions, social networks are assumed to be fast mixing, and Sybil nodes— which disrupt the fast mixing property of social networks—are detected. Little is known about the cause of the mixing quality in social graphs, and how to improve it in slow mixing ones. In ...
An attacker who can control arbitrarily many user identities can break the security properties of most conceivable systems. This is called a “Sybil attack”. We present a solution to this problem that does not require online communication with a trusted third party and that in addition preserves the privacy of honest users. Given an initial so-called Sybil-free identity domain, our proposal can ...
Detecting and suspending fake accounts (Sybils) in online social networking (OSN) services protects both OSN operators and OSN users from illegal exploitation. Existing social-graph-based defense schemes effectively bound the accepted Sybils to the total number of social connections between Sybils and non-Sybil users. However, Sybils may still evade the defenses by soliciting many social connec...
The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks. There are number of attacks on wireless sensor networks like black hole attack, sink hole attack ,Sybil attack ,selective forwarding attacks etc. in this paper we will concentrate...
Whānau is a novel routing protocol for distributed hash tables (DHTs) that is efficient and strongly resistant to the Sybil attack. Whānau uses the social connections between users to build routing tables that enable Sybil-resistant lookups. The number of Sybils in the social network does not affect the protocol’s performance, but links between honest users and Sybils do.When there are n well-c...
Few security mechanisms in wireless sensor networks (WSNs) have been implemented, and even fewer have been applied in real deployments. The limited resources of each sensor node makes security in WSNs hard, as the tradeoff between security and practicality must be carefully considered. While there are many types of security attacks in WSNs, we have decided to focus our analysis on a particularl...
The Sybil attack is one of the most aggressive and evasive attacks in sensor networks that can affect on many aspects of network functioning. Thus, its efficient detection is of highest importance. In order to resolve this issue, in this work we propose to couple reputation systems with agents based on selforganizing map algorithm trained for detecting outliers in data. The response of the syst...
-Peer-to-Peer (P2P) network is a distributed network architecture that partitions tasks or workloads among peers (nodes). Similar to traditional Internet, P2P networks are open to many attacks. In this research work we survey the defensive measures against general attacks as well as P2P specific attacks. We take BitTorrent (a P2P communications protocol for file sharing) as an example to illust...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید