نتایج جستجو برای: sybil attack

تعداد نتایج: 80969  

Journal: :CoRR 2011
Dhadesugoor R. Vaman Niraj Shakhakarmi

A novel Strict Friendliness Verification (SFV) scheme based on the integrated key consisting of symmetric node identity, geographic location and round trip response time between the sender and the receiver radio in MANET is proposed. This key is dynamically updated for encryption and decryption of each packet to resolve Wormhole attack and Sybil attack. Additionally, it meets the minimal key le...

Journal: :Information Visualization 2011
Aidong Lu Weichao Wang Abhishek Dnyate Xianlin Hu

We present a robust intrusion detection approach for wireless networks based on a new multi-matrix visualization method with a set of pattern generation, evaluation, organization, and interaction functions. Our approach concentrates on assisting users to analyze statistical network topology patterns that could expose significant attack features. Specifically, we investigate Sybil attacks that h...

2014
Ravinder Singh Tanisha Saini

-This paper includes VANETs that is vehicular Ad-hoc network. It is a sub class of mobile ad hoc network (MANET). It is self-configuring network which do not have any fixed infrastructure. In this the vehicles are act as nodes to create mobile network. It is also called as intelligent transportation system. There are various attacks in VANET’s like DOS attack, prankster attack, fabrication atta...

2010
Tanvir Al Amin Rifat Ahsan

Recently, Sybil attack has become one of the most visible security problems in the peer to peer networks where it is not possible to depend on trusted authorities for admission control or maintenance. In such networks or in any open distributed systems, an adversary creates many fake identities in order to increase its influence and deny service to honest participants. Defending against this at...

2011

This paper explores the fundamental limits of using only the structure of social networks to defend against sybil attacks. We derive the number of attack edges needed to foil sybil defenses based on each of the known statistical properties of social graphs: our results suggest that it may be impossible to use this properties to identify with high probability both sybil and honest nodes. We then...

2006
Alice Cheng Eric Friedman

The sybil attack is one of the easiest and most common methods of manipulating reputation systems. In this paper, we quantify the increase in reputation due to creating sybils under the PageRank algorithm. We compute explicit bounds for the possible PageRank value increase, and we use these bounds to estimate the rank increase. Finally, we measure the effect of sybil creation on nodes in a web ...

2015
Purva Sharma

Wireless Sensor Networks (WSNs) continue to grow and become widely used in many applications in military, ecological, home automation and health-related areas. Due to distributed nature of sensor networks security becomes fundamental requirement for communication among sensor nodes. The inclusion of wireless communication among various sensor nodes suffers from various types of security threats...

Journal: :International Journal of Computer Science and Informatics 2012

Journal: :International Journal of Computer Applications 2015

2015
Ankit Gupta Deepak Sukheja Amrita Tiwari

Network security in mobile Adhoc network is major issue. MANET system efficiency and security is compromised to create instability, disrupt network performance reducing fault tolerance, capability and attack on confidentiality, integrity and availably of information in network .the attack on adhoc is launched mainly in network layer to reducing Trust ship of system. Open nature communication ma...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید