نتایج جستجو برای: sybil attack
تعداد نتایج: 80969 فیلتر نتایج به سال:
<span>Vehicular ad hoc network (VANET) is an emerging technology which can be very helpful for providing safety and security as well intelligent transportation services. But due to wireless communication of vehicles high mobility it has certain issues cost the people on road. One major concerns Sybil attack in attacker creates dummy identities gain influence that causes delay some service...
Wireless sensor network is an area where there has been alot of significant developments. These sensors are hugely utilized in many applications like military applications, home automation, and environment surveillance. An application where confidential data is being transmitted requires to be protected from different types of attacks. Though the nodes are authenticated, they are liable to get ...
VANETs also called as intelligent transportation system (ITS) in which vehicles communicate to provide timely information. Their aim is to provide security, information and management of network. Instead of their many advantages vehicular network is prone to various attacks. In this research removal of Sybil attack in which node creates its multiple identities and it can be affected by various ...
Sybil attacks are a fundamental threat to the security of distributed system. There has been a growing interest in leveraging social network to mitigate Sybil attacks. We introduce Sybil belief a semi supervised learning framework to detect Sybil nodes. Sybil Belief takes a social network of the nodes in the system, a small set of known benign nodes, and, optionally, a small set of known Sybil’...
Distributed hash tables suffer from several security and privacy vulnerabilities, including the problem of Sybil attacks. Existing social network-based solutions to mitigate the Sybil attacks in DHT routing have a high state requirement and do not provide an adequate level of privacy. For instance, such techniques require a user to reveal their social network contacts. We design X-Vine, a prote...
This thesis in Computer Science is part of the trust management field and more specifically recommendation systems. These systems are usually based on users’ experiences (i.e., qualitative / quantitative) interacting with Web resources (eg. Movies, videos andWeb services). Recommender systems are undermined by three types of uncertainty that raises due to users’ ratings and identities that can ...
Sybil attack refers to the situation when a malicious node falsely claims have numerous identities and is known be one of security threats Internet Things (IoT). Due recent increase usage unmanned aerial vehicles (UAVs) in various applications, has been identified as threat flying ad hoc network (FANET) paradigm its integration with IoT form Flying (IoFT). In this paper, we propose an intellige...
Vehicle adhoc networks (VANET) are an application of Mobile adhoc networks (MANET). VANET performs management of traffic very well. It also circulates safety information to drivers and passengers in the vehicle. Here, in this paper we have proposed a novel scheme of Sybil attack detection mechanism or algorithm by using which the trajectory path communication among vehicles for identification w...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید