Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
ABSTRACT
    • by 
    •   10  
      Computer ScienceMobile Ad Hoc NetworksWireless CommunicationsWireless Sensor Networks
    • by 
    •   13  
      Cognitive ScienceDistributed ComputingDoS AttackIntrusion Detection
    • by 
    •   10  
      Distributed ComputingWireless Sensor NetworksWireless securityLocation-Awareness
    • by 
    •   5  
      Bit Error RateAd hoc networkVehicular ad hoc networkSybil Attack
    • by 
    •   17  
      Cognitive ScienceDistributed ComputingNetwork SecurityWireless Sensor Networks
    • by  and +1
    •   5  
      Information SecurityComputer SecurityCryptographyCyber Attacks
Existing on-line social networks (OSN) such as Facebook suffer from several weaknesses regarding privacy and security due to their inherent handling of personal data. As pointed out in [4], a preliminary analysis of existing OSNs shows... more
    • by 
    •   9  
      EngineeringComputer ScienceCommunication systemsTelecommunication
    • by 
    •   14  
      Information SystemsSocial NetworksInformation FilteringDigital Content
Wireless sensor networks constitute of sensor nodes which are small in size, running on battery, limited computation power, memory and communication capability. Operational environment of sensor nodes is generally unfavorable and... more
    • by 
    •   4  
      SecurityKey ManagementWireless Sensor NetworkSybil Attack
    • by 
    •   14  
      Wireless Sensor NetworksEnergy ConsumptionDoS AttackPublic key cryptography
The foreseen dream of Vehicular Ad Hoc NETwork (VANET) deployment is obstructed by long-chased security and privacy nightmares. Despite of the increasing demand for perfect privacy, it conflicts with rather more serious security threat... more
    • by 
    •   5  
      Security and PrivacyVANETsVANET, Beaconing, Single-Hop BroadcastSybil Attack
Existing on-line social networks (OSN) such as Facebook suffer from several weaknesses regarding privacy and security due to their inherent handling of personal data. As pointed out in [4], a preliminary analysis of existing OSNs shows... more
    • by 
    •   9  
      EngineeringComputer ScienceCommunication systemsTelecommunication
    • by 
    •   13  
      Cognitive ScienceDistributed ComputingDoS AttackIntrusion Detection
New Media usage has expanded in unexpected directions. This qualitative study pulls together two new media phenomena that demonstrate widespread engineered influence through Twitter dispersion. The first aspect is the practice of... more
    • by 
    •   4  
      Deception / Lying (Deception Lying)HomophilySybil AttackSock puppets
    • by 
    •   8  
      Health CareFace RecognitionSwarm IntelligenceSensor Network
    • by 
    •   7  
      Security and PrivacyDistributed Hash TableHot SpotDenial of Service
    • by 
    •   8  
      Trusted ComputingSoftwareDistributed Hash TableApplication Sharing
    • by 
    •   3  
      Mobile Peer-to-Peer NetworkDistributed Hash TableSybil Attack
Signal Strength based position verification is more promising as compared to other Sybil attack detection techniques because it is lightweight and does not require centralisation. Nodes can locally determine their locations through... more
    • by 
    •   9  
      Wireless NetworkAd Hoc NetworksWireless NetworkingAd hoc network
    • by 
    •   3  
      Social MediaSocial NetworkSybil Attack
    • by 
    •   3  
      Voting powerSocial NetworkSybil Attack
    • by 
    •   13  
      Computer ScienceWireless networksMobile ComputingWireless Network
    • by 
    •   9  
      MiddlewarePerformance EvaluationCase StudyMobile Peer-to-Peer Network
    • by 
    •   2  
      Peer to Peer ComputingSybil Attack
Wireless sensor networks constitute of sensor nodes which are running on battery, small in size, limited memory, computation power and communication capability. Operational environment of sensor nodes is generally unfavorable and... more
    • by 
    •   4  
      SecurityKey ManagementWireless Sensor NetworkSybil Attack
    • by 
    •   9  
      EngineeringComputer ScienceCommunication systemsTelecommunication
    • by 
    •   9  
      Wireless NetworkAd Hoc NetworksWireless NetworkingAd hoc network
One of the most important problems of WMNs, that is even preventing them from being used in many sensitive applications, is the lack of security. To ensure security of WMNs, two strategies need to be adopted: embedding security mechanisms... more
    • by 
    •   10  
      NetworkIntrusion DetectionUnsupervised LearningWireless Mesh Network
    • by 
    •   14  
      Computer ScienceDistributed ComputingSocial NetworksRouting
    • by 
    •   2  
      Overlay NetworkSybil Attack
    • by 
    •   45  
      Computer ScienceGame TheoryRoutingComplexity
    • by 
    •   9  
      AlgorithmsDesignRoutingComputer Security
    • by 
    •   9  
      PrivacyMobile Ad Hoc NetworkWireless Network SecurityAnonymous Communication
Our main contribution is a novel approach to enhancing po- sition security in VANET. We achieve local and global posi- tion security by using the on-board radar to detect neighbor- ing vehicles and to confirm their announced coordinates.... more
    • by 
    •   5  
      Time SeriesData CollectionVehicular ad hoc networkComputer communication networks
    • by 
    •   6  
      Sensor Network SecurityNon Functional RequirementSensor NetworkSecure Routing
    • by 
    •   2  
      Overlay NetworkSybil Attack
    • by 
    •   10  
      Distributed ComputingCommunity DetectionComputer SoftwareCommunity Structure
    • by 
    •   7  
      Wireless Sensor Network SecurityTime SynchronizationGlobalExperimental Data
    • by 
    • Sybil Attack
The Sybil Attack is a serious threat to the secure and dependable operation of wireless ad hoc networks. This paper proposes an algorithm to provide each correct node in an one-hop wireless network with a quorum of non-Sybil identities... more
    • by 
    •   7  
      SecurityWireless networksWireless NetworkAd Hoc Networks
    • by  and +1
    •   7  
      Group communicationAnonymityTraffic analysisMobile Peer-to-Peer Network
    • by 
    •   3  
      Peer to PeerAdmission ControlSybil Attack
    • by 
    •   9  
      MiddlewarePerformance EvaluationCase StudyMobile Peer-to-Peer Network
The Sybil attack is one of the most aggressive and evasive attacks in sensor networks that can affect on many aspects of network functioning. Thus, its efficient detection is of highest importance. In order to resolve this issue, in this... more
    • by 
    •   9  
      Artificial IntelligenceAgent BasedOutlier detectionSensor Network
    • by 
    •   3  
      Voting powerSocial NetworkSybil Attack
The Sybil attack is one of the most aggressive and evasive attacks in sensor networks that can affect on many aspects of network functioning. Thus, its efficient detection is of highest importance. In order to resolve this issue, in this... more
    • by 
    •   9  
      Artificial IntelligenceAgent BasedOutlier detectionSensor Network
    • by 
    •   14  
      Computer ScienceDistributed ComputingSocial NetworksRouting
    • by 
    •   3  
      Voting powerSocial NetworkSybil Attack
    • by 
    •   3  
      Voting powerSocial NetworkSybil Attack
    • by 
    •   2  
      Overlay NetworkSybil Attack