نتایج جستجو برای: sybil attack
تعداد نتایج: 80969 فیلتر نتایج به سال:
Obtaining user feedback (using votes) is essential in ranking user-generated online content. However, any online voting system is susceptible to the Sybil attack where adversaries can out-vote real users by creating several Sybil identities. In this paper, we present SumUp, a Sybilresilient online content rating system that leverages trust networks among users to defend against Sybil attacks wi...
With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection bas...
Sybil attack is one of the most severe attacks in the vast domain of ad-hoc network. Mobile Ad-hoc Network (MANET) has to face this attack in its different application areas due to its inherent properties like mobility, absence of centralized infrastructure and limited resources. In this paper the threats of Sybil attacks in different environment of MANET is discussed briefly and taxonomy of va...
Sybil attack is considered one of the most damaged attack that menace structured p2p overlay networks. It’s the most sophisticated node active, used for a variety of illicit activities. A key requirement for these activities is the ability of such malicious user to generate a huge number of node identifiers and possibly choose some of them in order to disrupt availability and integrity in such ...
Due to open and anonymous nature, online social networks are particularly vulnerable to the Sybil attack, in which a malicious user can fabricate many dummy identities to attack the systems. Recently, there is a flurry of interests to leverage social network structure for Sybil defense. However, most of graph-based approaches pay little attention to the distrust information, which is an importa...
In this system Sybil attack is detected by localization of nodes by using the infrastructures. Privacy and security are the two important issues in VANETs. Sybil attack is an attack that the malicious user pretends to be multiple vehicles. This reduces the load on the DMV by finding the Sybil vehicle. This is done by the help of RSU that determines the location of the suspicious node andfind th...
Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerni...
In VANET, many attacks rely on having the attacker generate multiple identities to simulate multiple nodes, this is called the Sybil attack. By creating a large number of nameless identities, using them to gain large influence to the system. Utilizing social relationship among trajectories according to the similarity definition of two trajectories, Footprint can recognize and therefore dismiss ...
Security is imperative for some Sensor Network Applications. An especially unsafe assault against sensor and impromptu systems is known as the Sybil attack, where a node illegitimately asserts numerous characters. In this type of attack a legal node is converted into a Sybil node which is a replica node with a different personality but using a similar ID. This leads to data leakage which causes...
Sybil attack is a well-known attack against wireless sensor networks (WSNs) in which a malicious node attempts to propagate multiple identities. This attack is able to affect routing protocols negatively as well as many other operations such as voting, data aggregation, resource allocation, misbehavior detection, etc. In this paper, a light weight, dynamic algorithm is proposed for detecting Sy...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید