A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Detection of malicious consumer interest packet with dynamic threshold values
2021
PeerJ Computer Science
The experimental results show that we are successful in mitigating the vulnerability of the CPA mitigation scheme by detecting and blocking the flooding interface, at the cost of very little verification ...
The malicious face is blocked when the cache-miss ratio hits the threshold value, which is adjusted dynamically through monitoring the cache-miss ratio and queue capacity values. ...
Full-size DOI: 10.7717/peerj-cs.435/fig-5
Figure 6 6 Flooding attack with threshold value and with one malicious consumer. ...
doi:10.7717/peerj-cs.435
pmid:33834105
pmcid:PMC8022593
fatcat:hetudtfgjvadbesfk2w3jw6fvi
DH-EAACK Secure Intrusion Detection System to detect Black Hole Attack in MANET
2014
International Journal of Computer Applications
Comparing results of existing systems with proposed system when there are 30% malicious nodes in the network PDR is 0.9% better than existing techniques. ...
By using the schemes of EAACK, this paper proposed dynamic hierarchical intrusion detection architecture that addresses these challenges while finding specific and conventional attacks in MANET. ...
Shakshuki Malicious nodes are detected by using Enhanced Adaptive Acknowledgement scheme. EAACK scheme is incorporated with digital signature to provide security. ...
doi:10.5120/18193-9107
fatcat:t23uctaf3bghzm4atdd43uchhu
Security Analysis for a VANET Privacy Protection Scheme
2022
Journal of Cyber Security
We propose a scheme based on fair blind signature and secret sharing algorithm. In this paper, we prove that the scheme is feasible through security analysis. ...
Using such an authentication scheme, every RSU can verify more than 26000 signatures per second simultaneously with the assistance of some proxy vehicles. ...
To change the one by one verification way between vehicles, Lee [4] propose a batch authentication scheme for VANETs. They use a bilinear pairing to verify the vehicles' identities. ...
doi:10.32604/jcs.2022.028792
fatcat:xtcobeqz5ncvrpfv5ycqwc2x7a
ADVANCED SECURITY FOR MANETS USING THRESHOLD CRYPTOGRAPHY
2015
International Journal of Research in Engineering and Technology
We considered the role of threshold cryptography to provide advanced security for the MANETs, revealing the authorization process using threshold digital signature, proxy signature and multi-signature ...
One of the challenging issues for such environments is secure authentication. ...
This paper presents a significantly improved construction and a complete rewrite and evaluation of our implementation that can significantly improves the overall concept of security for MANETs by using threshold ...
doi:10.15623/ijret.2015.0414011
fatcat:6uin7y72hfbpbei4bwpovamtjq
A Fully Distributed Proactively Secure Threshold-Multisignature Scheme
2007
IEEE Transactions on Parallel and Distributed Systems
Threshold-multisignature schemes combine the properties of threshold group-oriented signature schemes and multisignature schemes to yield a signature scheme that allows a threshold ðtÞ or more group members ...
The round optimal DKRU protocol solves a major problem with existing secret redistribution/updating schemes by giving group members a mechanism to identify malicious or faulty share holders in the first ...
The set ðR; SÞ will be a universally forged signature on the arbitrary message m, verifiable with the group-oriented signature verification equation, g SR ¼ R ðRþhðmÞÞ y mod p. ...
doi:10.1109/tpds.2007.1005
fatcat:a5rjvg6lh5c3jo3kzz45zg7kau
Detecting Sybil Attacks using Proofs of Work and Location in VANETs
[article]
2019
arXiv
pre-print
Extensive experiments and simulations demonstrate that our scheme achieves high detection rate to Sybil attacks with low false negative and acceptable communication and computation overhead. ...
In this paper, we propose a Sybil attack detection scheme using proofs of work and location. ...
A brief description to the threshold signature scheme is as follows. ...
arXiv:1904.05845v1
fatcat:xrnzracqjndqxp3qp7yrhj42gy
An efficient ECC-based mechanism for securing network coding-based P2P content distribution
2013
Peer-to-Peer Networking and Applications
The two schemes cooperate to thwart pollution attacks on network coding effectively in P2P networks, not only detecting corrupted blocks on-the-fly efficiently, but also precisely identifying all the malicious ...
Security analysis demonstrates that ESNC can resist hash collision attacks, signature forgery attacks, and collusion attacks with arbitrary number of colluding malicious peers. ...
Hence, the proposed network coding signature scheme can efficiently verify blocks on-the-fly with low computation overheads. ...
doi:10.1007/s12083-013-0239-x
fatcat:6ma2ooczl5bohgzdowcyazxjqe
ENHANCHING SECURITY FOR MANETs USING DISCRETE KEY GENERATIONS
2020
International Journal of Engineering Technology and Management Sciences
These networks often suffer with a problem of Malicious attacks from different types of attackers. ...
Mobile Ad Hoc is a network connection method which is most often associated with wireless devices. The connection is established for the duration of one session and requires no base station. ...
To make threshold signature scheme more secure against malicious acts, [1] proposed the verifiable IP-address binding with public key. Each square region has a specific number of nodes=N. ...
doi:10.46647/ijetms.2020.v04i05.008
fatcat:4vdvqs6hfzhttl6ms3zlirs3q4
An efficient incentive scheme with a distributed authority infrastructure in peer-to-peer networks
2012
Journal of Parallel and Distributed Computing
Such malicious nodes/collusions are difficult to detect, especially in a large network without a centralized authority. ...
The proposed scheme includes three major components: a distributed authority infrastructure, a key sharing protocol, and a contract verification protocol. ...
infrastructure to manage the nodes' history information with low overhead and high security. (3) We design a key sharing protocol and a contract verification protocol based on the threshold cryptography ...
doi:10.1016/j.jpdc.2012.08.003
fatcat:pjmaclaxfjfj3deetvz2s3o2bi
Dynamic Cluster Based Intrusion Detection Architecture to Detect Routing Protocol Attacks in MANET
2014
International Journal of Sensor Networks and Data Communications
By using the schemes of EAACK we propose a cooperative, dynamic hierarchical intrusion detection architecture that addresses these challenges while finding specific and conventional attacks in MANET. ...
The usefulness of the architecture is demonstrated via black hole attack scenarios in which attack is detected and removed. ...
H (msg')=d' 5) Eve can verify the signature by applying Bob's public key.
Figure 1 a 1 ) Shows flow of ACK scheme.
Figure 1 : 1 Flowchart of EAACK Schemes a) ACK b) S-ACK. ...
doi:10.4172/2090-4886.1000116
fatcat:sx67p272lbgfhjk7sxa2buh2ce
Scaling VANET security through cooperative message verification
2015
2015 IEEE Vehicular Networking Conference (VNC)
VANET security introduces significant processing overhead for resource-constrained On-Board Units (OBUs). ...
Here, we propose a novel scheme that allows secure Vehicular Communication (VC) systems to scale well beyond network densities for which existing optimization approaches could be workable, without compromising ...
P r check has an impact on the probability of bogus message (thus, malicious node) detection and the waiting time distribution: more signatures need to be verified for higher P r check . ...
doi:10.1109/vnc.2015.7385588
dblp:conf/vnc/JinP15
fatcat:hnfgywxaqzfz3j32mkrbtvashm
Broadcast Message Authentication Mechanism to Detect Clone and Sybil attacks in VANET's based on ID-Based Signature Scheme
2018
International Journal of Engineering & Technology
In this paper we propose a secure broadcast message authentication and attack detection mechanism with Identity – Based Signatures. ...
Our scheme shown best performance compared to existing schemes in terms of packet delivery ration, detection rate and detection time. ...
This technique is based on an identity-based signature approach along with malicious attack detection scheme. ...
doi:10.14419/ijet.v7i3.12.17770
fatcat:ln4ruhibf5f6lmvlecft7cmxim
A verifiable E-voting scheme with secret sharing
2015
2015 IEEE 16th International Conference on Communication Technology (ICCT)
In this paper, we propose a distributed and verifiable e-voting scheme based on Mignotte's threshold secret sharing scheme, which effectively balances the conflict of interest between voters and count ...
Additionally, this scheme can also resist potential attacks from malicious participants, and satisfy special requirements of e-voting, especially for privacy and accountability, which contradict each other ...
Our scheme uses Mignotte's threshold secret sharing technique, which is based on the Chinese Remainder Theorem. ...
doi:10.1109/icct.2015.7399848
fatcat:j65rp2qdl5fo7husymwp3zvwhe
Improving security and efficiency of enterprise digital rights management
2015
2015 6th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
Digital files containing sensitive information should be protected against external and internal malicious attacks. ...
Keywords-enterprise digital rights management, information dispersal, secure storage, efficient reliable storage, threshold decryption B. ...
This increases the security of the decryption key against up to t malicious servers. The first practical threshold decryption scheme was proposed by Desmedt et al. ...
doi:10.1109/icccnt.2015.7395177
fatcat:yudtonlnxncrdozcsmr5pz6jtq
On-demand public-key management for mobile ad hoc networks
2006
Wireless Communications and Mobile Computing
OPKM makes use of broadcasting technology and digital signature mechanism to provide key management service on demand, while protecting the certificate distribution against man-in-the-middle attacks. ...
In this paper, we present Ondemand Public Key Management (OPKM), a novel public key management scheme for wireless ad hoc networks. ...
During the multi-hop certificate distribution, such malicious modification can be detected via a following intermediate node verifying digital signatures of its neighbours within two hops. i → N 1 (i): ...
doi:10.1002/wcm.396
fatcat:pg6ax65iljgo3ayeq7saydgsre
« Previous
Showing results 1 — 15 out of 4,994 results