نتایج جستجو برای: sybil attack
تعداد نتایج: 80969 فیلتر نتایج به سال:
Security has become one of the major issues for Data Communication over wired and wireless networks. In Wireless Sensor Networks (WSN), the hackers can inject false data via compromised nodes and can able to alter the original files. There are many chances to perform a Denial Of Service (DOS) attack in WSNs. Initially send the Dynamic Key to all the cluster nodes followed by neighboring nodes. ...
Sybil attack is an important problem as the peer-to-peer networks grow in size and become prominent means for distributing multimedia. In order to validate the feasibility of using psychometric tests as an approach to detect Sybils in their entirety as Sybil groups, experiment is conducted by taking the tests on a population of considerable size. Selected people were given multiple questionnair...
Security and Privacy are among the most important concerns in Vehicular Ad-hoc Networks (VANET). Widely accepted privacy preserving communication scheme in VANETcommunity -that is using pseudonyms –has left open doors for some security problems such as Sybil attack. In this paper, we have proposed an efficient approach detecting this attack while preserving privacy of vehicles in the network.
Security is one of the most challenging issues in Mobile ad-hoc networks (MANETs). Most of the routing protocols in MANETs do not have an inbuilt mechanism to fight security attacks. Sybil attack is one such attack in which a single physical device takes on multiple identities in network thus behaving as multiple independent devices. With the help of these forged identities, the attacker can dr...
The Sybil attack is one where an user creates multiple Duplicate or fake identities to compromise the running of the system. Online social networks(OSN) suffers from the creation of fake accounts that introduce fake product reviews, malware and spam, existing defenses focus on using the social graph structure to isolate fakes. This paper presents VoteTrusta salable defense system that further l...
The Sybil attack is one where an user creates multiple Duplicate or fake identities to compromise the running of the system. Online social networks(OSN) suffers from the creation of fake accounts that introduce fake product reviews, malware and spam, existing defenses focus on using the social graph structure to isolate fakes. This paper presents VoteTrusta salable defense system that further l...
A Sybil attack occurs when an adversary controls multiple system identifiers (IDs). Limiting the number of (bad) IDs to a minority is critical for tolerating malicious behavior. popular tool enforcing bad resource burning (RB): verifiable consumption network resource. Unfortunately, typical RB defenses require non-Sybil (good) consume at least as many resources adversary. We present new defense...
Electronic voting has become popular in democratic countries, and thus the cyber security of this system is demanded. In paper, some attacks were made on a proposed electronic election model based blockchain technology, where impact each attack (Sybil, DDoS, Eclipse, Selfish mining, 51% attack) was calculated, time which it achieved calculated. study, we investigate Blockchain technology’s surf...
We propose an economic approach to Sybil attack detection. In our Informant protocol, a detective offers a reward for Sybils to reveal themselves. The detective accepts from one identity a security deposit and the name of target peer; the deposit and a reward are given to the target. We prove the optimal strategy for the informant is to play the game if and only if she is Sybil with a low oppor...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید