نتایج جستجو برای: wormhole and sybil attacks

تعداد نتایج: 16832654  

2013
Saurabh Bagchi Srikanth Hariharan Ness Shroff Ness B. Shroff

Wireless Sensor Networks are increasingly being used for data monitoring in commercial, industrial, and military applications. Security is of great concern from many different viewpoints: ensuring that sensitive data does not fall into wrong hands; ensuring that the received data has not been doctored; and ensuring that the network is resilient to denial of service attacks. We study the fundame...

2015
Philipp Winter Roya Ensafi Karsten Loesing Nick Feamster

The Tor network is periodically subject to Sybil attacks. Most of these attacks were not carefully executed and Tor directory authority operators were quick to detect and block the malignant relays. However, the Tor network lacks sophisticated tools to detect and protect against Sybil attacks. As a result, more advanced attacks could remain undetected. While there is a large body of work dedica...

2012
Zhuhua Cai Chris Jermaine

Collaborative and recommendation-based computer systems are plagued by attackers who create fake or malicious identities to gain more influence in the system— such attacks are often referred to as “Sybil attacks”. We propose a new statistical model and associated learning algorithms for detecting Sybil attacks in a collaborative network using network topology, called the latent community (LC) m...

Journal: :Wireless Personal Communications 2021

Abstract Wireless sensor networks (WSN) were cataloged as one of the most important emerging technologies last century and are considered basis Internet Things paradigm. However, an undeniable disadvantage WSN is that resources available for these types networks, such processing capacity, memory, battery, usually in short supply. This limitation implements security mechanisms a difficult task. ...

2016
Rupinder Singh Jatinder Singh Ravinder Singh

Security has become a most important issue for several significant applications provided by wireless sensor networks (WSNs). The intrinsically susceptible features of WSNs employ them susceptible to a diversity of attacks. This paper has centered on how to protect from a principally destructive type of attack called Sybil attack. A Sybil node using only one physical device may produce an random...

2014
Mr. M. Vinoth Ms. N. Radhika

The multi hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks, and Sybil attacks. The situation is further aggravated by mobile and harsh networ...

Journal: :Computer Standards & Interfaces 2021

In the last decade, automotive industry incorporated multiple electronic components into vehicles introducing various capabilities for adversaries to generate diverse types of attacks. comparison older vehicles, where biggest concern was physical security, modern might be targeted remotely. As a result, attack vectors aiming disrupt different vehicle emerged. Research and practice lack comprehe...

2014
Huanhuan Zhang Chang Xu Jie Zhang

Due to open and anonymous nature, online social networks are particularly vulnerable to the Sybil attack, in which a malicious user can fabricate many dummy identities to attack the systems. Recently, there is a flurry of interests to leverage social network structure for Sybil defense. However, most of graph-based approaches pay little attention to the distrust information, which is an importa...

2016
Philipp Winter Roya Ensafi Karsten Loesing Nick Feamster

Being a volunteer-run, distributed anonymity network, Tor is vulnerable to Sybil attacks. Little is known about real-world Sybils in the Tor network, and we lack practical tools and methods to expose Sybil attacks. In this work, we develop sybilhunter, the first system for detecting Sybil relays based on their appearance, such as configuration; and behavior, such as uptime sequences. We used sy...

2012
Shyamala Ramachandran Valli Shanmugam

Routing is a basic step for data exchange. In wireless ad-hoc networks each node acts as a router and executes a routing protocol. Wireless ad-hoc networks are highly resource constrained in terms of network topology, memory and computation power. The reliable data transfer is a difficult task in wireless ad-hoc networks because of resource constraints. A mobile ad-hoc network (MANET) is a kind...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید