نتایج جستجو برای: sybil attack
تعداد نتایج: 80969 فیلتر نتایج به سال:
Vehicular Ad Hoc Network (VANET) is a wireless network formed between a collection of vehicles connected through wireless connections. VANETs can help increase the passengers‟ comfort, safety, efficiency and convenience by providing them with information about the ongoing road status and other relevant road information. VANETs, similar to other networks, face numerous security threats. One such...
Security is a condemnatory situation in the network at the instant of transference. Miscellaneous grouping of attacks become visible in the network. In this paper we will examine about Sybil Attack. The proposed technique is the major idealization of our effort to provide elevated security to the network from Sybil attack using timestamp approach. Our proposed effort focused to diminish the iss...
Most peer-to-peer systems are vulnerable to Sybil attacks. The Sybil attack is an attack wherein a reputation system is subverted by a considerable number of forging identities in peer-to-peer networks. By illegitimately infusing false or biased information via the pseudonymous identities, an adversary can mislead a system into making decisions benefiting herself. For example, in a distributed ...
Infrastructure less nature distinguish the Ad-hoc network from other networks. In Ad-hoc environment mobile nodes having wireless capability collaborate with each other to form a network. For this collaboration purpose each mobile node can act as router. Mobile nodes in Ad-hoc network can move around and are free to do so. By applying the restrictions caused by the infrastructure less, collabor...
Late advances in the computerized genuine astute system (CPSG) have engaged a wide extent of new contraptions reliant upon information and correspondence development (ICT). Regardless, these ICT-enabled are feeble to creating risk attacks. This paper plays out serious review top tier security system. By focusing on real layer CPSG, this gives distracted bound together state-space model, which a...
Collaborative and recommendation-based computer systems are plagued by attackers who create fake or malicious identities to gain more influence in the system— such attacks are often referred to as “Sybil attacks”. We propose a new statistical model and associated learning algorithms for detecting Sybil attacks in a collaborative network using network topology, called the latent community (LC) m...
Wireless Sensor Networks (WSNs) suffer from many security attacks when deployed either in remote or hostile environments. Among possible attacks, the Sybil attack is one of the severe attacks in which malicious nodes report false identities and location information such that the remaining nodes believe that many nodes exist in their vicinity. The current study proposes a method for detecting Sy...
Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these “Sybil attacks” is to have a trusted ag...
As the most promising application in VANETs, the vehicular announcement allows vehicles to send announcement messages about road conditions to other vehicles far away. The security requirements of reliability and privacy in the vehicular announcement are not easily achieved simultaneously due to the notorious sybil attack. In this paper, we present a novel privacy-preserving vehicular announcem...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید