نتایج جستجو برای: wormhole and sybil attacks

تعداد نتایج: 16832654  

2016
Anuradha Jayakody Rohan Samarasinghe Saluka R. Kodituwakku

In nature of the transmission medium the broadcast, Wireless sensor networks are vulnerable to security attacks. The nodes are placed in a hostile or dangerous environment where they are not tangibly safe in the MANETs. In many application, the data obtained from the sensing nodes need a false, or malicious node could intercept private information or could send false messages to nodes in the ne...

2015
Shefali Khatri Punit Sharma Arvind Negi Himanshu Gupta A. I. Umar N. Ul Amin

MANET is an independent and infrastructureless network comprising of self configurable mobile nodes connected via wireless links. MANET is susceptible to various attacks because of some loopholes present in MANET like dynamic topology, zero central administration, limited physical security etc. MANET is prone to numerous malicious attacks one such attack among them is SYBIL ATTACK. In Sybil att...

Journal: :IEEE Access 2023

Internet of Things (IoT) has revolutionized the world in last decade. Today millions devices are connected to each other utilizing IoT technology one way or other. With significant growth devices, provision security is imperative. Routing protocol for low power and lossy networks (RPL) a network layer protocol, specially designed routing devices. RPL faces many attacks such as selective forward...

Journal: :CoRR 2011
Dhadesugoor R. Vaman Niraj Shakhakarmi

A novel Strict Friendliness Verification (SFV) scheme based on the integrated key consisting of symmetric node identity, geographic location and round trip response time between the sender and the receiver radio in MANET is proposed. This key is dynamically updated for encryption and decryption of each packet to resolve Wormhole attack and Sybil attack. Additionally, it meets the minimal key le...

Journal: :CoRR 2015
Rupesh Gunturu

This paper reviews the Sybil attack in social networks, which has the ability to compromise the whole distributed network. In the Sybil attack, the malicious user claims multiple identities to compromise the whole network. Sybil attacks can be used to change the overall ranking in voting applications, bad-mouth an opinion, access resources or to break the trust mechanism behind a P2P network. I...

2015
B. Selvam

Sybil attacks are a fundamental threat to the security of distributed system. There has been a growing interest in leveraging social network to mitigate Sybil attacks. We introduce Sybil belief a semi supervised learning framework to detect Sybil nodes. Sybil Belief takes a social network of the nodes in the system, a small set of known benign nodes, and, optionally, a small set of known Sybil’...

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

Journal: :Internet of things 2021

The Internet of things (IoT) is rapidly growing, and many security issues relate to its wireless technology. These are challenging because IoT protocols heterogeneous, suit different needs, used in application domains. From this assessment, we identify the need provide a homogeneous formalism applying every protocols. In survey, describe generic approach with twofold challenges. first challenge...

2016
P. Raghu

Wireless Sensor Networks (WSNs) suffer from many security attacks when deployed either in remote or hostile environments. Among possible attacks, the Sybil attack is one of the severe attacks in which malicious nodes report false identities and location information such that the remaining nodes believe that many nodes exist in their vicinity. The current study proposes a method for detecting Sy...

2004
Lingxuan Hu David Evans

Wormhole attacks enable an attacker with limited resources and no cryptographic material to wreak havoc on wireless networks. To date, no general defenses against wormhole attacks have been proposed. This paper presents an analysis of wormhole attacks and proposes a countermeasure using directional antennas. We present a cooperative protocol whereby nodes share directional information to preven...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید