A Network Clustering Algorithm for Sybil-Attack Resisting

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Thwarting Sybil Attack using ElGamal Algorithm

MANET is an independent and infrastructureless network comprising of self configurable mobile nodes connected via wireless links. MANET is susceptible to various attacks because of some loopholes present in MANET like dynamic topology, zero central administration, limited physical security etc. MANET is prone to numerous malicious attacks one such attack among them is SYBIL ATTACK. In Sybil att...

متن کامل

A swift neural network-based algorithm for demand estimation in concrete moment-resisting buildings

Rapid evaluation of demand parameters of different types of  buildings is crucial for social restoration after damaging earthquakes. Previous studies proposed numerous methodologies to measure the performance of buildings for assessing the potential risk under the seismic hazard. However, time-consuming Nonlinear Response History Analysis (NRHA) barricaded implementing a prompt loss estimation ...

متن کامل

An Improved DV-Hop Algorithm for Resisting Wormhole Attack

As DV-Hop algorithm estimates distance by distance vector exchanging, positioning process is vulnerable to devastate wormhole attacking. An improved DV-Hop algorithm (AWADV-Hop) which resists wormhole attack is proposed, based on the original algorithm in this paper. To solve the problem that hops and the average distance per hop is the most vulnerable to wormhole attack in DV-Hop. This paper f...

متن کامل

The Sybil Attack

Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these “Sybil attacks” is to have a trusted ag...

متن کامل

Sybil Nodes as a Mitigation Strategy Against Sybil Attack

Sybil attack is considered one of the most damaged attack that menace structured p2p overlay networks. It’s the most sophisticated node active, used for a variety of illicit activities. A key requirement for these activities is the ability of such malicious user to generate a huge number of node identifiers and possibly choose some of them in order to disrupt availability and integrity in such ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEICE Transactions on Information and Systems

سال: 2011

ISSN: 0916-8532,1745-1361

DOI: 10.1587/transinf.e94.d.2345