A Network Clustering Algorithm for Sybil-Attack Resisting
نویسندگان
چکیده
منابع مشابه
Thwarting Sybil Attack using ElGamal Algorithm
MANET is an independent and infrastructureless network comprising of self configurable mobile nodes connected via wireless links. MANET is susceptible to various attacks because of some loopholes present in MANET like dynamic topology, zero central administration, limited physical security etc. MANET is prone to numerous malicious attacks one such attack among them is SYBIL ATTACK. In Sybil att...
متن کاملA swift neural network-based algorithm for demand estimation in concrete moment-resisting buildings
Rapid evaluation of demand parameters of different types of buildings is crucial for social restoration after damaging earthquakes. Previous studies proposed numerous methodologies to measure the performance of buildings for assessing the potential risk under the seismic hazard. However, time-consuming Nonlinear Response History Analysis (NRHA) barricaded implementing a prompt loss estimation ...
متن کاملAn Improved DV-Hop Algorithm for Resisting Wormhole Attack
As DV-Hop algorithm estimates distance by distance vector exchanging, positioning process is vulnerable to devastate wormhole attacking. An improved DV-Hop algorithm (AWADV-Hop) which resists wormhole attack is proposed, based on the original algorithm in this paper. To solve the problem that hops and the average distance per hop is the most vulnerable to wormhole attack in DV-Hop. This paper f...
متن کاملThe Sybil Attack
Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these “Sybil attacks” is to have a trusted ag...
متن کاملSybil Nodes as a Mitigation Strategy Against Sybil Attack
Sybil attack is considered one of the most damaged attack that menace structured p2p overlay networks. It’s the most sophisticated node active, used for a variety of illicit activities. A key requirement for these activities is the ability of such malicious user to generate a huge number of node identifiers and possibly choose some of them in order to disrupt availability and integrity in such ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Information and Systems
سال: 2011
ISSN: 0916-8532,1745-1361
DOI: 10.1587/transinf.e94.d.2345