نتایج جستجو برای: wormhole and sybil attacks

تعداد نتایج: 16832654  

2015
Sahil Batra

Infrastructure less nature distinguish the Ad-hoc network from other networks. In Ad-hoc environment mobile nodes having wireless capability collaborate with each other to form a network. For this collaboration purpose each mobile node can act as router. Mobile nodes in Ad-hoc network can move around and are free to do so. By applying the restrictions caused by the infrastructure less, collabor...

2009
Michael Kohnen Mike Leske Erwin P. Rathgeb

The Kad network is a structured P2P network used for file sharing. Research has proved that Sybil and Eclipse attacks have been possible in it until recently. However, the past attacks are prohibited by newly implemented security measures in the client applications. We present a new attack concept which overcomes the countermeasures and prove its practicability. Furthermore, we analyze the effi...

2014
Thibaut Vallée Grégory Bonnet Bruno Zanuttini François Bourdon

Hedonic games model agents that decide which other agents they will join, given some preferences on other agents. We study Sybil attacks on such games, by a malicious agent which introduces multiple false identities, so that the outcome of the game is more interesting for itself. First taking Nash stability as the solution concept, we consider two simple manipulations, and show that they are es...

Journal: :JISR on Computing 2022

Wireless Body Area Network (WBAN) is a promising technology that having significant number of applications in healthcare. Despite several benefits, WBAN susceptible to security attacks, particularly related the node misbehavior attacks such as sinkhole, wormhole, blackhole, and grayhole attacks. In this research work, performance AODV protocol against wormhole sinkhole has been analyzed. This c...

2016
Bimal Viswanath

The rising popularity of social computing systems has managed to attract rampant forms of service abuse that negatively affects the sustainability of these systems and degrades the quality of service experienced by their users. The main factor that enables service abuse is the weak identity infrastructure used by most sites, where identities are easy to create with no verification by a trusted ...

2010
Chris Lesniewski-Laas M. Frans Kaashoek

Whānau is a novel routing protocol for distributed hash tables (DHTs) that is efficient and strongly resistant to the Sybil attack. Whānau uses the social connections between users to build routing tables that enable Sybil-resistant lookups. The number of Sybils in the social network does not affect the protocol’s performance, but links between honest users and Sybils do.When there are n well-c...

2014
S. Vinothkumar

Wireless networks are helpless to identity based attacks, as well as spoofing and Sybil attacks, which allow for many other form of attacks on the networks. Even though the identity of a node can be confirmed through cryptographic authentication, authentication is not always probable, because it require key management and additional infrastructural overhead. A method for detect both spoofing an...

2011
Zaw Tun Ni Lar Thein

The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attack in wireless ad hoc networks is wormhole attacks and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas This paper analyzes the nature of wormhole attack and existing methods of defending mec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید