نتایج جستجو برای: wormhole and sybil attacks

تعداد نتایج: 16832654  

Journal: :Smart CR 2013
Aziz Mohaisen Joongheon Kim

In this paper we have a close look at the Sybil attack and advances in defending against it, with particular emphasis on the recent work. We identify three major veins of literature work to defend against the attack: using trusted certification, using resources testing, and using social networks. The first vein of literature considers defending against the attack using trusted certification, wh...

2015
Mehdi Sookhak Adnan Akhundzada Alireza Sookhak Mohammadreza Eslaminejad Abdullah Gani Muhammad Khurram Khan Xiong Li Xiaomin Wang

Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS) attack. Besides, crafting the wormhole attack is comparatively simple; though,...

2013
Nagendra Kumar Shubham Omar Sandeep Saxena

The ad-hoc networks are the temporarily established wireless networks which does not require fixed infrastructure it is also called as infrastructure less network. There is no central control authority in ad-hoc network. Because of some flaws of ad-hoc network such as shared wireless medium and lack of any central coordination makes them more prone to attacks in comparison with the wired networ...

2013
Wei Chang Jie Wu

Most peer-to-peer systems are vulnerable to Sybil attacks. The Sybil attack is an attack wherein a reputation system is subverted by a considerable number of forging identities in peer-to-peer networks. By illegitimately infusing false or biased information via the pseudonymous identities, an adversary can mislead a system into making decisions benefiting herself. For example, in a distributed ...

Journal: :International Journal of Computer Applications 2016

2012
Nicole El Zoghby Véronique Berge-Cherfaoui Bertrand Ducourthial Thierry Denoeux

Sybil attacks have become a serious threat as they can affect the functionality of VANETs (Vehicular Ad Hoc Networks). This paper presents a method for detecting such attacks in VANETs based on distributed data fusion. An algorithm has been developed in order to build distributed confidence over the network under the belief function framework. Our approach has been validated by simulation.

2008
Richard Gopaul Peter Kruus Dan Sterne Brian Rivera

In-band wormhole attacks undermine routing by attracting network traffic that otherwise may have bypassed the attackers via alternate, lower-cost routes. The result gives the attackers control over the attracted traffic, allowing them to modify, delay, redirect, eavesdrop, or drop the traffic. In this paper we expand upon the gravitational analysis technique, first presented in [KSG06], for eva...

2010
Zorana Bankovic David Fraga José Manuel Moya Juan Carlos Vallejo Álvaro Araujo Pedro Malagón Juan-Mariano de Goyeneche Daniel Villanueva Elena Romero Javier Blesa

The Sybil attack is one of the most aggressive and evasive attacks in sensor networks that can affect on many aspects of network functioning. Thus, its efficient detection is of highest importance. In order to resolve this issue, in this work we propose to couple reputation systems with agents based on selforganizing map algorithm trained for detecting outliers in data. The response of the syst...

2018
Chundong Wang Likun Zhu Liangyi Gong Zhentang Zhao Lei Yang Zheli Liu Xiaochun Cheng

With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection bas...

Journal: :International Journal of Computer Applications 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید