نتایج جستجو برای: sybil attack

تعداد نتایج: 80969  

2015
Priyanka Soni Abhilash Sharma

Vanet is the branch of networking which deals with the communication of data between different vehicles. The vehicles have been designed with sensors that communicate with RSU and other vehicles available in the range. In the vanet network various attackers perform attack on the network to stop the communication of different vehicles. This attack can make collision between different nodes. The ...

2009
Dinh Nguyen Tran Bonan Min Jinyang Li Lakshminarayanan Subramanian

Obtaining user opinion (using votes) is essential to ranking user-generated online content. However, any content voting system is susceptible to the Sybil attack where adversaries can out-vote real users by creating many Sybil identities. In this paper, we present SumUp, a Sybilresilient vote aggregation system that leverages the trust network among users to defend against Sybil attacks. SumUp ...

Journal: :Intelligent Automation & Soft Computing 2011
Jing-Jing Gui Jinshuang Wang Yu-sen Zhang Tao Zhang

The threat analysis for routing protocol is a significant issue in the ad-hoc network security. In this paper we propose a framework in which the vulnerabilities from the Sybil attack for ad-hoc routing protocol can be modeled in a mathematic approach, and the formal analysis is carried out with a specific proof system under the extended strand space model in order to further verify the validit...

2009
Thibault Cholez Isabelle Chrisment Olivier Festor

In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three main mechanisms: a protection against flooding through packet tracking, an IP address limitation and a verification of identities. We evaluate their efficiency by designing and adapting an attack for several KAD clients...

2017
Rupinder Singh Dr. Jatinder Singh Ravinder Singh

Wireless Sensor Networks (WSNs) are susceptible to Sybil attacks in which malicious node creates a huge number of fake identities in order to gain an excessively high advantage through a Byzantine method. A Sybil node using only one physical device may generate random number of additional node identities and can be used to disrupt normal functioning of the WSN, such as multipath routing which i...

2014
Khushboo Mittal Priyanka Garg

Vehicular Ad hoc Networks (VANET) is the subclass of Mobile Ad Hoc Networks (MANETs). It is the most advanced technology that provides Intelligent Transportation System (ITS) in wireless communication among vehicles to vehicles and road side equipment (RSUs) to vehicles according to IEEE 802.11p standard. VANET provides broad range of safety and non safety applications. Safety application provi...

2010
José Antonio Cárdenas-Haro Goran Konjevod

Peer-to-peer systems are known to be vulnerable to the Sybil attack. The lack of a central authority allows a malicious user to create many fake identities (called Sybil nodes) pretending to be independent honest nodes. The goal of the malicious user is to influence the system on his/her behalf. In order to detect the Sybil nodes and prevent the attack, a reputation system is used for the nodes...

Journal: :JCM 2008
Shiuh-Jeng Wang Yuh-Ren Tsai Chung-Wei Chen

We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom scheme. The attacker needs to compromise the specified number of nodes to compromise the whole systems. Furthermore, our scheme which provides a stronger relationship between ID and key would make authentication more reli...

Journal: :International Journal of Research in Engineering and Technology 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید