نتایج جستجو برای: sybil attack
تعداد نتایج: 80969 فیلتر نتایج به سال:
—In this paper, we propose two certificate mechanisms for preventing the Sybil attack in a vehicular ad hoc network (VANET): the timestamp series approach and the temporary certificate approach. We focus on an early-stage VANET when the number of smart vehicles is only a small fraction of the vehicles on the road and the only infrastructure components available are the roadside units (RSUs). Un...
Mobile ad hoc network (MANETs) is an infrastructure-less/self-configurable system in which every node carries on as host or router and every node can participate in the transmission of packets. Because of its dynamic behaviour such system is more susceptible against various sorts of security threats, for example, Black hole, Wormhole , Jamming , Sybil, Byzantine attack and so on which may block...
Security is important for many sensor network applications. Wireless Sensor Networks (WSN) are often deployed in hostile environments as static or mobile, where an adversary can physically capture some of the nodes. once a node is captured, adversary collects all the credentials like keys and identity etc. the attacker can reprogram it and replicate the node in order to eavesdrop the transmitte...
Underwater sensors and acoustic networks have several unique applications including water quality ocean life monitoring as well navigation exploration. They also peculiar physical layer characteristics with respect to operating frequency attenuation which makes them different from terrestrial wireless sensor communication, thus coupled their large cost of deployment, sensitivity, they are highl...
www.ijeist.in Abstract— Wireless sensor networks are usually deployed at unattended or hostile environments. Therefore, they are very vulnerable to various security attacks, such as selective forwarding, wormholes, and Sybil attacks. In addition, wireless sensor networks may also suffer from Injecting false data attack. For an injecting false data attack, an adversary first compromises several ...
Sybil attacks and Identity Clone attacks (also known as Profile Cloning attacks) have become significant security and privacy concerns for online social network (OSN) systems integrated with reputation or evaluation mechanisms. In both attacks, adversaries first create multiple identities and then launch attacks to compromise reputation or evaluation mechanisms in OSN systems. In this paper, we...
Wireless ad hoc network is a collection of mobile nodes and all nodes behave as router or host. Due to its dynamic nature and lack of central authority security is challenging task. The nodes of network may compromise from the various security threats and can leak the personal information. Numerous security threats such as Denial of Service, black hole attack, Gray-hole attack, Worm hole, Sybil...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید