نتایج جستجو برای: wormhole and sybil attacks
تعداد نتایج: 16832654 فیلتر نتایج به سال:
Infrastructure less nature distinguish the Ad-hoc network from other networks. In Ad-hoc environment mobile nodes having wireless capability collaborate with each other to form a network. For this collaboration purpose each mobile node can act as router. Mobile nodes in Ad-hoc network can move around and are free to do so. By applying the restrictions caused by the infrastructure less, collabor...
The Kad network is a structured P2P network used for file sharing. Research has proved that Sybil and Eclipse attacks have been possible in it until recently. However, the past attacks are prohibited by newly implemented security measures in the client applications. We present a new attack concept which overcomes the countermeasures and prove its practicability. Furthermore, we analyze the effi...
Hedonic games model agents that decide which other agents they will join, given some preferences on other agents. We study Sybil attacks on such games, by a malicious agent which introduces multiple false identities, so that the outcome of the game is more interesting for itself. First taking Nash stability as the solution concept, we consider two simple manipulations, and show that they are es...
Wireless Body Area Network (WBAN) is a promising technology that having significant number of applications in healthcare. Despite several benefits, WBAN susceptible to security attacks, particularly related the node misbehavior attacks such as sinkhole, wormhole, blackhole, and grayhole attacks. In this research work, performance AODV protocol against wormhole sinkhole has been analyzed. This c...
The rising popularity of social computing systems has managed to attract rampant forms of service abuse that negatively affects the sustainability of these systems and degrades the quality of service experienced by their users. The main factor that enables service abuse is the weak identity infrastructure used by most sites, where identities are easy to create with no verification by a trusted ...
Whānau is a novel routing protocol for distributed hash tables (DHTs) that is efficient and strongly resistant to the Sybil attack. Whānau uses the social connections between users to build routing tables that enable Sybil-resistant lookups. The number of Sybils in the social network does not affect the protocol’s performance, but links between honest users and Sybils do.When there are n well-c...
Wireless networks are helpless to identity based attacks, as well as spoofing and Sybil attacks, which allow for many other form of attacks on the networks. Even though the identity of a node can be confirmed through cryptographic authentication, authentication is not always probable, because it require key management and additional infrastructural overhead. A method for detect both spoofing an...
The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attack in wireless ad hoc networks is wormhole attacks and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas This paper analyzes the nature of wormhole attack and existing methods of defending mec...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید