نتایج جستجو برای: sybil attack

تعداد نتایج: 80969  

2015
S. Hamdan R. S. Al-Qassas S. Tedmori

Vehicular Ad Hoc Network (VANET) is a wireless network formed between a collection of vehicles connected through wireless connections. VANETs can help increase the passengers‟ comfort, safety, efficiency and convenience by providing them with information about the ongoing road status and other relevant road information. VANETs, similar to other networks, face numerous security threats. One such...

2017
Shikha Sharma Shivani Sharma

Security is a condemnatory situation in the network at the instant of transference. Miscellaneous grouping of attacks become visible in the network. In this paper we will examine about Sybil Attack. The proposed technique is the major idealization of our effort to provide elevated security to the network from Sybil attack using timestamp approach. Our proposed effort focused to diminish the iss...

2013
Wei Chang Jie Wu

Most peer-to-peer systems are vulnerable to Sybil attacks. The Sybil attack is an attack wherein a reputation system is subverted by a considerable number of forging identities in peer-to-peer networks. By illegitimately infusing false or biased information via the pseudonymous identities, an adversary can mislead a system into making decisions benefiting herself. For example, in a distributed ...

2015
Sahil Batra

Infrastructure less nature distinguish the Ad-hoc network from other networks. In Ad-hoc environment mobile nodes having wireless capability collaborate with each other to form a network. For this collaboration purpose each mobile node can act as router. Mobile nodes in Ad-hoc network can move around and are free to do so. By applying the restrictions caused by the infrastructure less, collabor...

Journal: :International Journal of Health Sciences (IJHS) 2022

Late advances in the computerized genuine astute system (CPSG) have engaged a wide extent of new contraptions reliant upon information and correspondence development (ICT). Regardless, these ICT-enabled are feeble to creating risk attacks. This paper plays out serious review top tier security system. By focusing on real layer CPSG, this gives distracted bound together state-space model, which a...

2012
Zhuhua Cai Chris Jermaine

Collaborative and recommendation-based computer systems are plagued by attackers who create fake or malicious identities to gain more influence in the system— such attacks are often referred to as “Sybil attacks”. We propose a new statistical model and associated learning algorithms for detecting Sybil attacks in a collaborative network using network topology, called the latent community (LC) m...

2016
P. Raghu

Wireless Sensor Networks (WSNs) suffer from many security attacks when deployed either in remote or hostile environments. Among possible attacks, the Sybil attack is one of the severe attacks in which malicious nodes report false identities and location information such that the remaining nodes believe that many nodes exist in their vicinity. The current study proposes a method for detecting Sy...

2002
John R. Douceur

Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these “Sybil attacks” is to have a trusted ag...

Journal: :International Journal of Computer Applications 2011

Journal: :CoRR 2014
Yichen Jiang

As the most promising application in VANETs, the vehicular announcement allows vehicles to send announcement messages about road conditions to other vehicles far away. The security requirements of reliability and privacy in the vehicular announcement are not easily achieved simultaneously due to the notorious sybil attack. In this paper, we present a novel privacy-preserving vehicular announcem...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید