نتایج جستجو برای: sybil attack

تعداد نتایج: 80969  

2008
Dinh Nguyen Tran Bonan Min Jinyang Li Lakshminarayanan Subramanian

Obtaining user feedback (using votes) is essential in ranking user-generated online content. However, any online voting system is susceptible to the Sybil attack where adversaries can out-vote real users by creating several Sybil identities. In this paper, we present SumUp, a Sybilresilient online content rating system that leverages trust networks among users to defend against Sybil attacks wi...

2018
Chundong Wang Likun Zhu Liangyi Gong Zhentang Zhao Lei Yang Zheli Liu Xiaochun Cheng

With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection bas...

2014
Aditi Paul Somnath Sinha Sarit Pal

Sybil attack is one of the most severe attacks in the vast domain of ad-hoc network. Mobile Ad-hoc Network (MANET) has to face this attack in its different application areas due to its inherent properties like mobility, absence of centralized infrastructure and limited resources. In this paper the threats of Sybil attacks in different environment of MANET is discussed briefly and taxonomy of va...

2014
Zied Trifa Maher Khemakhem

Sybil attack is considered one of the most damaged attack that menace structured p2p overlay networks. It’s the most sophisticated node active, used for a variety of illicit activities. A key requirement for these activities is the ability of such malicious user to generate a huge number of node identifiers and possibly choose some of them in order to disrupt availability and integrity in such ...

2014
Huanhuan Zhang Chang Xu Jie Zhang

Due to open and anonymous nature, online social networks are particularly vulnerable to the Sybil attack, in which a malicious user can fabricate many dummy identities to attack the systems. Recently, there is a flurry of interests to leverage social network structure for Sybil defense. However, most of graph-based approaches pay little attention to the distrust information, which is an importa...

2015

In this system Sybil attack is detected by localization of nodes by using the infrastructures. Privacy and security are the two important issues in VANETs. Sybil attack is an attack that the malicious user pretends to be multiple vehicles. This reduces the load on the DMV by finding the Sybil vehicle. This is done by the help of RSU that determines the location of the suspicious node andfind th...

2015
Udaya Suriya Raj Kumar Dhamodharan Rajamani Vayanaperumal

Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerni...

2013
Sita Kumari

In VANET, many attacks rely on having the attacker generate multiple identities to simulate multiple nodes, this is called the Sybil attack. By creating a large number of nameless identities, using them to gain large influence to the system. Utilizing social relationship among trajectories according to the similarity definition of two trajectories, Footprint can recognize and therefore dismiss ...

2014
R. S. BHUVANESWARAN

Security is imperative for some Sensor Network Applications. An especially unsafe assault against sensor and impromptu systems is known as the Sybil attack, where a node illegitimately asserts numerous characters. In this type of attack a legal node is converted into a Sybil node which is a replica node with a different personality but using a similar ID. This leads to data leakage which causes...

Journal: :Computers & Electrical Engineering 2017
Mojtaba Jamshidi Ehsan Zangeneh Mehdi Esnaashari Mohammad Reza Meybodi

Sybil attack is a well-known attack against wireless sensor networks (WSNs) in which a malicious node attempts to propagate multiple identities. This attack is able to affect routing protocols negatively as well as many other operations such as voting, data aggregation, resource allocation, misbehavior detection, etc. In this paper, a light weight, dynamic algorithm is proposed for detecting Sy...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید