2,002 Hits in 4.5 sec

Detecting Sybil Nodes in Anonymous Communication Systems

Wenyu Zang, Peng Zhang, Xiao Wang, Jinqiao Shi, Li Guo
2013 Procedia Computer Science  
Many anonymous communication and censorship-resistant systems have incorporated Sybil defense in their designs based on social networks.  ...  As one of the most fundamental problems in open-membership systems, Sybil attack has attracted wide attentions from both industrial and academic fields.  ...  (ii) Sybil defense in peer-to-peer anonymous communication systems. In these systems, user relies on each other to relay his traffic to the destination.  ... 
doi:10.1016/j.procs.2013.05.110 fatcat:7kv2uadx2baxtpks3uyegqatki

An Analysis of Active Attacks on Anonymity Systems

Tianbo Lu, Pan Gao, Xiaofeng Du, Yang Li
2016 International Journal of Security and Its Applications  
As a result, the research on anonymous communication system is gradually increasing.  ...  In recent years, the research shows that: anonymity is also gradually being the important indicator of information security.  ...  The distributed denial of service attack in anonymous communication system means that the malicious nodes in the system share a large amount of data requests to other nodes, so that other nodes in the  ... 
doi:10.14257/ijsia.2016.10.4.11 fatcat:7jx4wlj65jghnd7tk32xjmmfca

Vehicular Adhoc Network Based Location Routing Protocol for Secured Energy

2019 International Journal of Engineering and Advanced Technology  
The projected Energy aware ALERT detects the Sybil attack within the network, Routing protocol, geographical routing  ...  relay nodes, that Anon-traceable anonymous route.  ...  Objective  To detect the Sybil attack in the network,  To avoid the Sybil attack in the network, Architecture Diagram B.  ... 
doi:10.35940/ijeat.e1050.0785s319 fatcat:jd4h7afqbbgxhfmje2ohoe6sja

Social networking for anonymous communication systems: A survey

Rodolphe Marques, Andre Zuquete
2011 2011 International Conference on Computational Aspects of Social Networks (CASoN)  
In this paper we present a survey of a new research area which goal is to exploit trust in social links to solve some of the shortcomings of anonymous communication systems.  ...  Anonymous communication systems have been around for sometime, providing anonymity, enhanced privacy, and censorship circumvention.  ...  Another important application of social networks is the detection of Sybil attacks.  ... 
doi:10.1109/cason.2011.6085953 dblp:conf/cason/MarquesZ11 fatcat:ea52akggr5f75kbzdbtc3lhyke

Sybil Attack Detection in Vehicular Ad-hoc Networks using Direct Trust Calculation

In this work, a direct trust manager is introduced which derives the trust value of each of its neighbor nodes at a regular interval of time. If the trust value is deviated, it confirms sybil attack.  ...  The proposed system is compared with the existing system to prove improved sybil attack detection ratio, thus providing better security. NS2 environment is used to prove the simulation results.  ...  It is computed by using the following equation: FP = Total number of sybil nodes identified as genuine / Total number of sybil node (4) In existing system, sybil attack is detected only when an event occurs  ... 
doi:10.35940/ijitee.j7392.0891020 fatcat:a6wuspqug5htbd26wrv3hkty7e

An Improved MAC Address Based Intrusion Detection and Prevention System in MANET Sybil Attacks

C.A. Gokula Krishnan, Dr.A. Suphalakshmi
2017 Bonfring International Journal of Research in Communication Engineering  
In this paper, we realized to in tentds the Sybil Attack Detection Based on MAC address classification technique which is used to detect the Sybil nodes in the network and also prevent it.  ...  In the Sybil attack a each node presents numerous fake characteristics to other swellings in the network.  ...  PROPOSED MAC ADDRESS BASED IDS IN SYBIL ATTACKS In Proposed System is for detection the mitigation and prevention of Sybil attack, any node can surprise the discovery for Sybil node.  ... 
doi:10.9756/bijrce.8315 fatcat:2nmjwr6nsvgbrdh24dk2kneuqe

Pisces: Anonymous Communication Using Social Networks [article]

Prateek Mittal, Matthew Wright, Nikita Borisov
2012 arXiv   pre-print
First, paths for anonymous communication are built without considering trust relationships between users and relays in the system.  ...  The architectures of deployed anonymity systems such as Tor suffer from two key problems that limit user's trust in these systems.  ...  This work is sponsored in part by NSF CAREER Award, number CNS-0954133, and by award number CNS-1117866.  ... 
arXiv:1208.6326v1 fatcat:p3vugpynjbc5resjeixc6vhpbe

Privacy and security in online social networks: A survey

Imrul Kayes, Adriana Iamnitchi
2017 Online Social Networks and Media  
This article provides an overview of the privacy and security issues that emerged so far in OSNs.  ...  Online Social Networks (OSN) are a permanent presence in today's personal and professional lives of a huge segment of the population, with direct consequences to offline activities.  ...  Detection systems against Sybil attacks provide mechanisms to detect whether a user (node) v ∈ V is Sybil or non-Sybil.  ... 
doi:10.1016/j.osnem.2017.09.001 fatcat:xme5wwkyfbhnpgoiwgadknageq

VoteTrust: Leveraging friend invitation graph to defend against social network Sybils

Jilong Xue, Zhi Yang, Xiaoyong Yang, Xiao Wang, Lijiang Chen, Yafei Dai
2013 2013 Proceedings IEEE INFOCOM  
Recently, there has been much excitement in the research community over exploiting social network structure to detect Sybils.  ...  In this paper, we present VoteTrust, a Sybil detection system that further leverages user interactions of initiating and accepting links.  ...  Acknowledgments We thank the anonymous reviewers for their comments.  ... 
doi:10.1109/infcom.2013.6567045 dblp:conf/infocom/XueYYWCD13 fatcat:n4sa2amq3vb5detdzqkamz3uuu

Detecting Sybil Nodes in Static and Dynamic Networks [chapter]

José Antonio Cárdenas-Haro, Goran Konjevod
2010 Lecture Notes in Computer Science  
In order to detect the Sybil nodes and prevent the attack, a reputation system is used for the nodes, built through observing its interactions with its peers.  ...  In this research is argued that in realistic communication schedule scenarios, simple graph-theoretic queries such as the computation of Strongly Connected Components and Densest Subgraphs, help in exposing  ...  Conclusions We showed a novel system to detect Sybil nodes and prevent Sybil attack.  ... 
doi:10.1007/978-3-642-16949-6_15 fatcat:4tmhb5nw3zd6dizukrwxl3fju4

Group Key Agreement Scheme with Privacy Preservation for Social Media Platform

Sundari K
2019 International Journal for Research in Applied Science and Engineering Technology  
In this proposed scheme, provide member anonymity to ensure the privacy of the communication between the social networking platform and the members The proposed solution does not rely on a centralized  ...  Network security is protection of the access to files and directories in a computer network against hacking, misuse and unauthorized changes to the system.  ...  Sybil Community Detection Algorithm After one Sybil node is identified, The Sybil community detection algorithm can be used to detect the Sybil community surrounding it.  ... 
doi:10.22214/ijraset.2019.3138 fatcat:yob462zsbbhvzodm4ghxnknkvy


Yushan Liu, Shouling Ji, Prateek Mittal
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
We experimentally demonstrate the applicability of adaptive random walks on a number of social network based security and privacy systems, including Sybil defenses, anonymous communication and link privacy  ...  preserving systems, and show up to two orders of magnitude improvement in performance.  ...  We mainly consider three social network based security and privacy systems, including Sybil defense, anonymous communication and link privacy preserving systems. a) Sybil defenses.  ... 
doi:10.1145/2976749.2978319 dblp:conf/ccs/LiuJM16 fatcat:gumslqzrxzalpgq7mfp4cadbju

A Survey on Sybil Attack in Vehicular Ad-hoc Network

Deepak Kushwaha, Piyush Kumar Shukla, Raju Baraskar
2014 International Journal of Computer Applications  
Researchers are gaining interest in this technology. Due to its open nature it is vulnerable to various attacks. Sybil attack is one of them.  ...  We also give a summary of the techniques given in this paper, which is based on some parameters used in those techniques.  ...  In that detection method they use 1) cooperative detection method in which each node cooperates to detect Sybil node.  ... 
doi:10.5120/17262-7614 fatcat:z3hjucc3prbj3kajk6jv7ax5ka

Survey of Sybil Attacks in Social Networks [article]

Rupesh Gunturu
2015 arXiv   pre-print
In the Sybil attack, the malicious user claims multiple identities to compromise the network.  ...  In this paper, different defense mechanisms used to mitigate Sybil attacks are also reviewed.  ...  Consider a wireless communication network, in which a node wants to detect the Sybil nodes around it.  ... 
arXiv:1504.05522v1 fatcat:ijqpjvrlivgqjm53k6ysyrs2wm

Expressive and Deployable Swarm Intelligence Based Cybersecurity for Wireless Sensor Network

I. Govindharajn, P. Jeeva, M. Kanimozhi, S. Kodieswari, A. Narmadha
2019 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
In this model WSN enabled Cyber Physical Systems use ID-Based Aggregate Signature Scheme to detect the cyber-attack and keep data integrity  ...  Wireless sensor networks (WSNs) play a pivotal role in Cyber Physical Systems (CPSs), particularly for operations such as observing the location and monitoring it.  ...  With regard to privacy-related notions in communication networks, we follow the terminologies on anonymity, unlinkability, and unobservability.  ... 
doi:10.32628/cseit1952140 fatcat:fkaw2vjrg5h53bwd66hnnwkujq
« Previous Showing results 1 — 15 out of 2,002 results