Sybil Attack
11 Followers
Recent papers in Sybil Attack
Existing on-line social networks (OSN) such as Facebook suffer from several weaknesses regarding privacy and security due to their inherent handling of personal data. As pointed out in [4], a preliminary analysis of existing OSNs shows... more
Wireless sensor networks constitute of sensor nodes which are small in size, running on battery, limited computation power, memory and communication capability. Operational environment of sensor nodes is generally unfavorable and... more
The foreseen dream of Vehicular Ad Hoc NETwork (VANET) deployment is obstructed by long-chased security and privacy nightmares. Despite of the increasing demand for perfect privacy, it conflicts with rather more serious security threat... more
Existing on-line social networks (OSN) such as Facebook suffer from several weaknesses regarding privacy and security due to their inherent handling of personal data. As pointed out in [4], a preliminary analysis of existing OSNs shows... more
New Media usage has expanded in unexpected directions. This qualitative study pulls together two new media phenomena that demonstrate widespread engineered influence through Twitter dispersion. The first aspect is the practice of... more
Signal Strength based position verification is more promising as compared to other Sybil attack detection techniques because it is lightweight and does not require centralisation. Nodes can locally determine their locations through... more
Wireless sensor networks constitute of sensor nodes which are running on battery, small in size, limited memory, computation power and communication capability. Operational environment of sensor nodes is generally unfavorable and... more
One of the most important problems of WMNs, that is even preventing them from being used in many sensitive applications, is the lack of security. To ensure security of WMNs, two strategies need to be adopted: embedding security mechanisms... more
Our main contribution is a novel approach to enhancing po- sition security in VANET. We achieve local and global posi- tion security by using the on-board radar to detect neighbor- ing vehicles and to confirm their announced coordinates.... more
The Sybil Attack is a serious threat to the secure and dependable operation of wireless ad hoc networks. This paper proposes an algorithm to provide each correct node in an one-hop wireless network with a quorum of non-Sybil identities... more
The Sybil attack is one of the most aggressive and evasive attacks in sensor networks that can affect on many aspects of network functioning. Thus, its efficient detection is of highest importance. In order to resolve this issue, in this... more
The Sybil attack is one of the most aggressive and evasive attacks in sensor networks that can affect on many aspects of network functioning. Thus, its efficient detection is of highest importance. In order to resolve this issue, in this... more