نتایج جستجو برای: sybil attack

تعداد نتایج: 80969  

Journal: :CoRR 2014
Meital Ben Sinai Nimrod Partush Shir Yadid Eran Yahav

We present an effective Sybil attack [12] against social location based services. Our attack is based on creating a large number of reputed “bot drivers”, and controlling their reported locations using fake GPS reports. We show how this attack can be used to influence social navigation systems by applying it to WAZE [8] a prominent social navigation application used by over 50 million drivers. ...

2004
Michael Clarke Ashley Watkins Mathew Adkins Mark A. Bokowiec

This paper introduces Sybil, an interactive tool for assisting in the teaching of sound synthesis and processing. We have created a ‘browser’ in MSP that permits patchers to be assembled into a structured learning package. All the sophistication and flexibility of MSP is available. Sybil provides text accompanied by examples that students can manipulate in real-time, hearing the results and see...

Journal: :CoRR 2014
Mahdi N. Al-Ameen Matthew K. Wright

P2P systems are highly susceptible to Sybil attacks, in which an attacker creates a large number of identities and uses them to control a substantial fraction of the system. Persea is the most recent approach towards designing a social network based Sybil-resistant DHT. Unlike prior Sybil-resistant P2P systems based on social networks, Persea does not rely on two key assumptions: (i) that the s...

2015
G. Keerthana

Wireless Sensor Network is one of the emerging fields in research area. It can be applied in several areas such as Area Monitoring, Health Care Monitoring, Environmental and Earth Sensing and Industrial Monitoring. WSNs are most vulnerable to various attacks like Denial of service attack, Wormhole attack, Sybil attack, Sinkhole attack, Select Forwarding attack, Blackhole attack, Malicious node ...

2010
Neal Lathia Stephen Hailes Licia Capra

Recommender systems are vulnerable to attack: malicious users may deploy a set of sybils to inject ratings in order to damage or modify the output of Collaborative Filtering (CF) algorithms. To protect against these attacks, previous work focuses on designing sybil profile classification algorithms, whose aim is to find and isolate sybils. These methods, however, assume that the full sybil prof...

2014
Ali Akbar Pouyan Mahdiyeh Alimohammadi

Vehicular communication intends to improve the traffic safety for decreasing number of accidents and manages traffic for saving money and time. In vehicular communication, vehicles communicate wirelessly and so security of this network against attackers should be considered. To become a real technology that has public safety on the roads, vehicular ad hoc network (VANET) needs appropriate secur...

2009
Diogo Miguel da Costa Mónica Oliveira

The present document is essentially a summarized version of the dissertation that will be developed within the scope of an MSc degree in Communication Networks, in the area of security in wireless ad hoc network. Wireless ad hoc networking is a technology that allows fast, easy, and inexpensive network deployment. Unfortunately, these advantages also make the task of an attacker simpler, as it ...

Journal: :CoRR 2012
Nitish Balachandran Sugata Sanyal

----------------------------------------------------------------ABSTRACT------------------------------------------------------------------Any decentralised distributed network is particularly vulnerable to the Sybil attack wherein a malicious node masquerades as several different nodes, called Sybil nodes, simultaneously in an attempt to disrupt the proper functioning of the network. Such attac...

2014
Nidhi Joshi Manoj Challa

Mobile ad-hoc networks (MANETs) are well known to be susceptible to various attacks, due to features such as lack of centralized control, dynamic topology, limited physical security and energy constrained operations. In this paper, we focus on preventing Sybil attack and Intruder nodes (malicious node). We are presenting a novel and secure authentication of nodes as soon as they comes in to the...

2011
Shan Chang Yong Qi Jizhong Zhao

In private vehicular networks, where privacy, especially the location privacy of anonymous vehicles is highly concerned, anonymous verification of vehicles is indispensable. Consequently, an attacker who succeeds in forging multiple hostile identifies can easily launch a Sybil attack, gaining a disproportionately large influence. In this paper, we propose a novel Sybil attack detection mechanis...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید