نتایج جستجو برای: sybil attack

تعداد نتایج: 80969  

2012
Nithya Joy Biju Paul

We propose a method which provides location privacy against traffic analysis attacks. Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be described as the passive attacks that try to deduce the traffic pattern based on the eavesdropped information. They launch an active attack according to the achieved i...

2010
Kiran Kumar Venkata Ponnam

Web 2.0 applications and websites towards social news, gaming and networking are particularly vulnerable to Sybil attacks. In a Sybil attack, a malicious user assumes many fake identities, and pretends to be multiple honest users in the system. By controlling a certain fraction of the nodes in the system, he out votes the honest users to promote his own news articles, which poses a threat to th...

2009
Indranil Saha Debapriyay Mukhopadhyay

A new functional for planar triangulation called Inner Core has been proposed in [4] for a location verification based defense against Sybil attack for sensor network, and also has been shown that the legitimacy of a new node inside the Inner Core of a triangle obtained by the triangulation of the set of sensor nodes can be established. In [4] it has been conjectured that Inner Core of a triang...

2015
Madjid Merabti Bashar Alohali Kashif Kifayat John Moores

Smart grid (SG) comprises a set of technologies that uses sensing, embedded processing and digital communications to intelligently control and monitor an electricity grid with improved reliability, security, and efficiency. However, its reliance on traditional IT principles presents a new attack vector for security threats and vulnerabilities. Key management is a fundamental requirement for sec...

2014
G. T. Raju William R. Claycomb Dongwan Shin Elaine Shi Dawn Song Yih-Chun Hu Zhibin Zhao Bo Wei Xiaomei Dong Lan Yao Fuxiang Gao Liping Teng Yongping Zhang Changlong Chen

Wireless sensor network is a field which is spreading its wings into different application areas. Security is the primary concern as these nodes are deployed in unattended and harsh environment. Authentication and integrity of data becomes essential to monitor the network installed in remote areas. This paper generates group keys for every session to encrypt data. The technique minimizes 5.5% o...

2017
Harsh Pratap Singh Rashmi Singh Abderrahmane Baadache Ali Belmehdi Nital Mistry Devesh C. Jinwala Mukesh Zaveri Payal N. Raj Prashant B. Swadas

Mobile ad hoc network (MANETs) is an infrastructureless/self-configurable system in which every node carries on as host or router and every node can participate in the transmission of packets. Because of its dynamic behaviour such system is more susceptible against various sorts of security threats, for example, Black hole, Wormhole , Jamming , Sybil, Byzantine attack and so on which may block ...

Journal: :International Journal of Computer Applications 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید