نتایج جستجو برای: sybil attack

تعداد نتایج: 80969  

2013
Haixia Zhao Yaowei Li Jincheng Shen Mingchuan Zhang Ruijuan Zheng Qingtao Wu

Geographical and Energy Aware Routing (GEAR) is an efficient routing protocol in wireless sensor networks (WSN). It behaves well in the face of routing attacks, but it is incapable of defending bogus routing information, sybil attack and selective forwarding. Aimed at this problem, this paper present a location pairwise keys bootstrap scheme based secure geographical and energy aware routing pr...

2015
Muhammad Saad Naveed Hasan Islam

Until recently vehicles and transportation systems were considered as the realm of mechanical engineers, but the need for the road safety and desire to be connected to the world, has broaden the industry scope. In order to do so Intelligent Transport System has been introduced and for few years, Vehicular Ad hoc Networks are getting much attention. The advance developments, wireless communicati...

2017
Yuanfeng Cai Dan Zhu

Results: The detection of fraudulent raters is not easy since they can behave strategically to camouflage themselves. We explore the potential strengths and limitations of blockchain-based reputation systems under two attack goals: ballot-stuffing and bad-mouthing, and various attack models including constant attack, camouflage attack, whitewashing attack and sybil attack. Blockchain-based repu...

2016
Clayton A. Davis Onur Varol Emilio Ferrara Alessandro Flammini Filippo Menczer

While most online social media accounts are controlled by humans, these platforms also host automated agents called social bots or sybil accounts. Recent literature reported on cases of social bots imitating humans to manipulate discussions, alter the popularity of users, pollute content and spread misinformation, and even perform terrorist propaganda and recruitment actions. Here we present Bo...

Journal: :International Journal of Engineering Applied Sciences and Technology 2020

Journal: :IOP Conference Series: Earth and Environmental Science 2021

Journal: :International Journal of Computer Applications 2016

Journal: :IEICE Transactions on Information and Systems 2011

Journal: :Expert Syst. Appl. 2015
Panagiotis G. Sarigiannidis Eirini D. Karapistoli Anastasios A. Economides

Security is becoming a major concern for many mission-critical applications wireless sensor networks (WSNs) are envisaged to support. The inherently vulnerable characteristics of WSNs appoint them susceptible to various types of attacks. This work restrains its focus on how to defend against a particularly harmful form of attack, the Sybil attack. Sybil attacks can severely deteriorate the netw...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید