نتایج جستجو برای: wormhole and sybil attacks
تعداد نتایج: 16832654 فیلتر نتایج به سال:
Wireless Sensor Networks are increasingly being used for data monitoring in commercial, industrial, and military applications. Security is of great concern from many different viewpoints: ensuring that sensitive data does not fall into wrong hands; ensuring that the received data has not been doctored; and ensuring that the network is resilient to denial of service attacks. We study the fundame...
The Tor network is periodically subject to Sybil attacks. Most of these attacks were not carefully executed and Tor directory authority operators were quick to detect and block the malignant relays. However, the Tor network lacks sophisticated tools to detect and protect against Sybil attacks. As a result, more advanced attacks could remain undetected. While there is a large body of work dedica...
Collaborative and recommendation-based computer systems are plagued by attackers who create fake or malicious identities to gain more influence in the system— such attacks are often referred to as “Sybil attacks”. We propose a new statistical model and associated learning algorithms for detecting Sybil attacks in a collaborative network using network topology, called the latent community (LC) m...
Abstract Wireless sensor networks (WSN) were cataloged as one of the most important emerging technologies last century and are considered basis Internet Things paradigm. However, an undeniable disadvantage WSN is that resources available for these types networks, such processing capacity, memory, battery, usually in short supply. This limitation implements security mechanisms a difficult task. ...
Security has become a most important issue for several significant applications provided by wireless sensor networks (WSNs). The intrinsically susceptible features of WSNs employ them susceptible to a diversity of attacks. This paper has centered on how to protect from a principally destructive type of attack called Sybil attack. A Sybil node using only one physical device may produce an random...
The multi hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks, and Sybil attacks. The situation is further aggravated by mobile and harsh networ...
In the last decade, automotive industry incorporated multiple electronic components into vehicles introducing various capabilities for adversaries to generate diverse types of attacks. comparison older vehicles, where biggest concern was physical security, modern might be targeted remotely. As a result, attack vectors aiming disrupt different vehicle emerged. Research and practice lack comprehe...
Due to open and anonymous nature, online social networks are particularly vulnerable to the Sybil attack, in which a malicious user can fabricate many dummy identities to attack the systems. Recently, there is a flurry of interests to leverage social network structure for Sybil defense. However, most of graph-based approaches pay little attention to the distrust information, which is an importa...
Being a volunteer-run, distributed anonymity network, Tor is vulnerable to Sybil attacks. Little is known about real-world Sybils in the Tor network, and we lack practical tools and methods to expose Sybil attacks. In this work, we develop sybilhunter, the first system for detecting Sybil relays based on their appearance, such as configuration; and behavior, such as uptime sequences. We used sy...
Routing is a basic step for data exchange. In wireless ad-hoc networks each node acts as a router and executes a routing protocol. Wireless ad-hoc networks are highly resource constrained in terms of network topology, memory and computation power. The reliable data transfer is a difficult task in wireless ad-hoc networks because of resource constraints. A mobile ad-hoc network (MANET) is a kind...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید