نتایج جستجو برای: sybil attack

تعداد نتایج: 80969  

2015
N. Priya S. Sri Gowtham

Security has become one of the major issues for Data Communication over wired and wireless networks. In Wireless Sensor Networks (WSN), the hackers can inject false data via compromised nodes and can able to alter the original files. There are many chances to perform a Denial Of Service (DOS) attack in WSNs. Initially send the Dynamic Key to all the cluster nodes followed by neighboring nodes. ...

Journal: :IJGUC 2012
K. Haribabu Chittaranjan Hota Arindam Paul

Sybil attack is an important problem as the peer-to-peer networks grow in size and become prominent means for distributing multimedia. In order to validate the feasibility of using psychometric tests as an approach to detect Sybils in their entirety as Sybil groups, experiment is conducted by taking the tests on a population of considerable size. Selected people were given multiple questionnair...

2011
Reza Mortazavi Maryam Rahbari

Security and Privacy are among the most important concerns in Vehicular Ad-hoc Networks (VANET). Widely accepted privacy preserving communication scheme in VANETcommunity -that is using pseudonyms –has left open doors for some security problems such as Sybil attack. In this paper, we have proposed an efficient approach detecting this attack while preserving privacy of vehicles in the network.

2015
Tripti Sharma Leenu Singh

Security is one of the most challenging issues in Mobile ad-hoc networks (MANETs). Most of the routing protocols in MANETs do not have an inbuilt mechanism to fight security attacks. Sybil attack is one such attack in which a single physical device takes on multiple identities in network thus behaving as multiple independent devices. With the help of these forged identities, the attacker can dr...

2016
Bangalore Deepthi

The Sybil attack is one where an user creates multiple Duplicate or fake identities to compromise the running of the system. Online social networks(OSN) suffers from the creation of fake accounts that introduce fake product reviews, malware and spam, existing defenses focus on using the social graph structure to isolate fakes. This paper presents VoteTrusta salable defense system that further l...

2017
Kevin Hoffman David Zage Cristina Nita-Rotaru Haewoon Kwak Changhyun Lee Hosung Park Brian Neil Levine Clay Shields James Newsome Elaine Shi Dawn Song Gianluca Stringhini Christopher Kruegel Jilong Xue Zhi Yang Xiaoyong Yang Xiao Wang Lijiang Chen Yafei Dai

The Sybil attack is one where an user creates multiple Duplicate or fake identities to compromise the running of the system. Online social networks(OSN) suffers from the creation of fake accounts that introduce fake product reviews, malware and spam, existing defenses focus on using the social graph structure to isolate fakes. This paper presents VoteTrusta salable defense system that further l...

Journal: :Journal of Computer and System Sciences 2023

A Sybil attack occurs when an adversary controls multiple system identifiers (IDs). Limiting the number of (bad) IDs to a minority is critical for tolerating malicious behavior. popular tool enforcing bad resource burning (RB): verifiable consumption network resource. Unfortunately, typical RB defenses require non-Sybil (good) consume at least as many resources adversary. We present new defense...

Journal: :Iraqi journal for computer science and mathematics 2023

Electronic voting has become popular in democratic countries, and thus the cyber security of this system is demanded. In paper, some attacks were made on a proposed electronic election model based blockchain technology, where impact each attack (Sybil, DDoS, Eclipse, Selfish mining, 51% attack) was calculated, time which it achieved calculated. study, we investigate Blockchain technology’s surf...

Journal: :i-manager's Journal on Mobile Applications and Technologies 2014

2007
N. Boris Margolin Brian Neil Levine

We propose an economic approach to Sybil attack detection. In our Informant protocol, a detective offers a reward for Sybils to reveal themselves. The detective accepts from one identity a security deposit and the name of target peer; the deposit and a reward are given to the target. We prove the optimal strategy for the informant is to play the game if and only if she is Sybil with a low oppor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید