نتایج جستجو برای: wormhole and sybil attacks

تعداد نتایج: 16832654  

Journal: :Security and Communication Networks 2015
Khaled Rabieh Mohamed M. E. A. Mahmoud Marianne Azer Mahmoud Allam

In Vehicular Ad Hoc Networks (VANETs), vehicles should report events to warn the drivers of unexpected hazards on the roads. While these reports can contribute to safer driving, VANETs suffer from various security threats; a major one is Sybil attacks. In these attacks, an individual attacker can pretend as several vehicles that report a false event. In this paper, we propose a secure event-rep...

Journal: :IJERTCS 2014
Ambika Nagaraj

Sensor networks are playing an important role in many applications. These networks mainly used as monitoring tool are deployed in harsh and unsupervised environment. Hence securing these nodes and the data which is being transmitted becomes a basic requirement. To adapt security to the network, the study uses cluster-based arrangement of nodes. The encryption key is generated based on location,...

Journal: :JCM 2008
Shiuh-Jeng Wang Yuh-Ren Tsai Chung-Wei Chen

We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom scheme. The attacker needs to compromise the specified number of nodes to compromise the whole systems. Furthermore, our scheme which provides a stronger relationship between ID and key would make authentication more reli...

2015
Huanhuan Zhang Jie Zhang Carol J. Fung Chang Xu

Due to their open and anonymous nature, online social networks are particularly vulnerable to Sybil attacks. In recent years, there has been a rising interest in leveraging social network topological structures to combat Sybil attacks. Unfortunately, due to their strong dependency on unrealistic assumptions, existing graph-based Sybil defense mechanisms suffer from high false detection rates. I...

Journal: :IEICE Transactions 2009
Le Xuan Hung Sungyoung Lee Young-Koo Lee Heejo Lee

For many sensor network applications such as military, homeland security, it is necessary for users (sinks) to access sensor networks while they are moving. However, sink mobility brings new challenges to secure routing in large-scale sensor networks. Mobile sinks have to constantly propagate their current location to all nodes, and these nodes need to exchange messages with each other so that ...

2014
M. Srikar Swamy Uday Kiran

The multihop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks, and Sybil attacks. The situation is further aggravated by mobile and harsh network...

2007
Yurong Xu Guanling Chen James Ford Fillia Makedon

This paper proposes a distributed wormhole detection algorithm for wireless sensor networks, a potential technology for infrastructures of many applications. Currently, most sensor networks assume they will be deployed in a benign environment; however, when a sensor network is deployed in some hostile environment, attacks (especially those like wormhole attacks that don’t need to capture the ke...

Journal: :The Smart Computing Review 2013

2008
N. Boris Margolin Brian Neil Levine

Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applications and protocols are more robust against the attack than others. In our approach, for each distributed application and an attacker objective, there is a critical value that determines the costeffectiveness of the at...

2015
Kesav Unnithan Lakshmi Devi

Wireless Sensor Network (WSN) is emerging as a prevailing technology due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks. Unattended installation of sensor nodes in the environment causes many security threats in the wireless sensor networks. There are many possible attacks on sensor network such as selective forwarding, ja...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید