نتایج جستجو برای: sybil attack
تعداد نتایج: 80969 فیلتر نتایج به سال:
Sybil attacks have become a serious threat as they can affect the functionality of VANETs (Vehicular Ad Hoc Networks). This paper presents a method for detecting such attacks in VANETs based on distributed data fusion. An algorithm has been developed in order to build distributed confidence over the network under the belief function framework. Our approach has been validated by simulation.
Although wireless channel comparison based techniques have been shown to defeat Sybil attacks in wireless environments, most assume single-input single-output (SISO) models for the radio system. We consider extending wireless Sybil defenses to multi-input multi-output (MIMO)
Consensus algorithms are applied in the context of distributed computer systems to improve their fault tolerance. The explosive development ledger technology following proposal ‘Bitcoin’ led a sharp increase research activity this area. Specifically, public and permissionless networks require robust leader selection strategies resistant Sybil attacks which malicious attackers present bogus iden...
Clustering in Wireless Sensor Networks (WSNs) attracted academia and industry alike due to the wide range of their applications. However, such networks suffer from limited energy sources. One of the solutions to the energy problem in WSNs is clustering. Therefore, many algorithms have been proposed for efficient clustering. One of the most famous clustering algorithms is Hybrid Energy Efficient...
Sybil attacker is the routing layer active attacker that replies with multiple identification number (ID's) to nodes that forward request to attacker in a different time instant and drop the data forwarded to attacker after link establishment. The proposed research work is provides the novel secure Intrusion Detection System (IDS) against routing misbehavior of Sybil attack in MANET. The IDS ar...
We analyze the Sybil proof and privacy properties of SybilGuard [YKGF06]. Sybilguard is a decentralized protocol that operates in a friendship graph type (overlay) network. The protocol prevents an attacker that is limited in its friendship relations from controlling arbitrarily many network nodes. We present a Sybil attack on SybilGuard that exploits the protocol’s network update functionality...
Considering the serious security trend of Content Sharing Networks (CSNs) and the advantages of Sybil nodes, a new Secure Model of Content Sharing Network by using multi-roles Sybil nodes (SMCSN) is hereby proposed. In SMCSN, we introduce three different kinds of Sybil nodes and discuss some issues of exploiting Sybil nodes like infiltrating collision, hotspots sensing and importance improvemen...
Tor is one of the most popular censorship circumven-tion systems; it uses bridges run by volunteers as proxies toevade censorship. A key challenge to the Tor circumventionsystem is to distribute bridges to a large number of userswhile avoiding having the bridges fall into the hands ofcorrupt users. We propose rBridge—a user reputation sys-tem for bridge distribution; it ...
Due to the broadcast nature of the wireless medium, wireless networks are especially vulnerable to Sybil attacks, where a malicious node illegitimately claims a large number of identities and thus depletes system resources. A wireless sensor network consists of many sensor nodes which are deployed to monitor physical or environmental conditions and to pass the collected data to a base station. ...
Wireless networks are helpless to identity based attacks, as well as spoofing and Sybil attacks, which allow for many other form of attacks on the networks. Even though the identity of a node can be confirmed through cryptographic authentication, authentication is not always probable, because it require key management and additional infrastructural overhead. A method for detect both spoofing an...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید