Thwarting Sybil Attack using ElGamal Algorithm
نویسندگان
چکیده
منابع مشابه
Thwarting Sybil Attack using ElGamal Algorithm
MANET is an independent and infrastructureless network comprising of self configurable mobile nodes connected via wireless links. MANET is susceptible to various attacks because of some loopholes present in MANET like dynamic topology, zero central administration, limited physical security etc. MANET is prone to numerous malicious attacks one such attack among them is SYBIL ATTACK. In Sybil att...
متن کاملThwarting the Sybil Attack in Wireless Ad Hoc Networks
The present document is essentially a summarized version of the dissertation that will be developed within the scope of an MSc degree in Communication Networks, in the area of security in wireless ad hoc network. Wireless ad hoc networking is a technology that allows fast, easy, and inexpensive network deployment. Unfortunately, these advantages also make the task of an attacker simpler, as it ...
متن کاملThe Sybil Attack
Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these “Sybil attacks” is to have a trusted ag...
متن کاملSybil Nodes as a Mitigation Strategy Against Sybil Attack
Sybil attack is considered one of the most damaged attack that menace structured p2p overlay networks. It’s the most sophisticated node active, used for a variety of illicit activities. A key requirement for these activities is the ability of such malicious user to generate a huge number of node identifiers and possibly choose some of them in order to disrupt availability and integrity in such ...
متن کاملPreserving against Sybil Attack in Mobile Ad Hoc Network Using SYDECT Algorithm
MANET is a kind of wireless network which is decentralized in nature and comprise of moving mobile nodes. Due to changing topology of such network it impose critical security protocol design against harmful attacks such as Sybil Attack. In a Sybil attack a malicious node can produce and manage a large number of logical identities on a single physical device. This gives the misapprehension to th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2015
ISSN: 0975-8887
DOI: 10.5120/21828-5085