نتایج جستجو برای: sybil attack

تعداد نتایج: 80969  

Journal: :CoRR 2015
Rupesh Gunturu

This paper reviews the Sybil attack in social networks, which has the ability to compromise the whole distributed network. In the Sybil attack, the malicious user claims multiple identities to compromise the whole network. Sybil attacks can be used to change the overall ranking in voting applications, bad-mouth an opinion, access resources or to break the trust mechanism behind a P2P network. I...

2004
James Newsome Elaine Shi Dawn Xiaodong Song Adrian Perrig

Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node illegitimately claims multiple identities. This paper systematically analyzes the threat posed by the Sybil attack to wireless sensor networks. We demonstrate that the attack can be exceedingly detrimental to many important f...

2017
Mandeep Kaur Avinash Jethi

The wireless sensor networks are prone to various attacks; this is primarily due to the fact that these networks once deployed are left unattended. So any attacker with the intention of stealing the information from the network can compromise any node and gain access to the data being propagated in the network. Various attacks possible are black hole attack, wormhole attack, Sybil attack, clone...

Journal: :CoRR 2011
Mina Rahbari Mohammad Ali Jabreil Jamali

Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based ...

Journal: :Peer-to-Peer Networking and Applications 2011
B. S. Jyothi D. Janaki Ram

Sybil attack is one of the most challenging problems that plague current decentralized Peer-toPeer(P2P) systems. In Sybil attack, a single malicious user creates multiple peer identities known as sybils. These sybils are employed to target honest peers and hence subvert the system. In this paper, we describe a novel solution that enables all honest peers to protect themselves from sybils with h...

Journal: :J. Inform. and Commun. Convergence Engineering 2011
Hwajeong Seo Howon Kim

Sybil attack can disrupt proper operations of wireless sensor network by forging its sensor node to multiple identities. To protect the sensor network from such an attack, a number of countermeasure methods based on RSSI (Received Signal Strength Indicator) and LQI (Link Quality Indicator) have been proposed. However, previous works on the Sybil attack detection do not consider the fact that Sy...

2006
Debapriyay Mukhopadhyay Indranil Saha

Security is a major concern for a large fraction of sensor network applications. Douceur first introduced the notion of sybil attack [4], where a single entity(node) illegitimately presents multiple identities. As the nodes in sensor networks can be physically captured by an adversary, sybil attack can manifest in a severe form leading to the malfunction of basic operational protocols including...

2016
D. P. Mishra G. M. Asutkar

Vehicular Ad-hoc Network (VANET) is vulnerable to many security threats including Sybil attack due to its open infrastructure. In this paper we have proposed a scheme to detect Sybil attacks using Digital Signature. The infrastructure needed includes vehicles, Road Side Units (RSUs) and Department of Motor Vehicle (DMV). In Sybil attack the malicious node, called Sybil attacker, illegally claim...

2016
Rupinder Singh Jatinder Singh Ravinder Singh

Security has become a most important issue for several significant applications provided by wireless sensor networks (WSNs). The intrinsically susceptible features of WSNs employ them susceptible to a diversity of attacks. This paper has centered on how to protect from a principally destructive type of attack called Sybil attack. A Sybil node using only one physical device may produce an random...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید