4,994 Hits in 4.3 sec

Detection of malicious consumer interest packet with dynamic threshold values

Adnan Mahmood Qureshi, Nadeem Anjum, Rao Naveed Bin Rais, Masood Ur-Rehman, Amir Qayyum
2021 PeerJ Computer Science  
The experimental results show that we are successful in mitigating the vulnerability of the CPA mitigation scheme by detecting and blocking the flooding interface, at the cost of very little verification  ...  The malicious face is blocked when the cache-miss ratio hits the threshold value, which is adjusted dynamically through monitoring the cache-miss ratio and queue capacity values.  ...  Full-size  DOI: 10.7717/peerj-cs.435/fig-5 Figure 6 6 Flooding attack with threshold value and with one malicious consumer.  ... 
doi:10.7717/peerj-cs.435 pmid:33834105 pmcid:PMC8022593 fatcat:hetudtfgjvadbesfk2w3jw6fvi

DH-EAACK Secure Intrusion Detection System to detect Black Hole Attack in MANET

Sarika Patil, Bharat Tidke
2014 International Journal of Computer Applications  
Comparing results of existing systems with proposed system when there are 30% malicious nodes in the network PDR is 0.9% better than existing techniques.  ...  By using the schemes of EAACK, this paper proposed dynamic hierarchical intrusion detection architecture that addresses these challenges while finding specific and conventional attacks in MANET.  ...  Shakshuki Malicious nodes are detected by using Enhanced Adaptive Acknowledgement scheme. EAACK scheme is incorporated with digital signature to provide security.  ... 
doi:10.5120/18193-9107 fatcat:t23uctaf3bghzm4atdd43uchhu

Security Analysis for a VANET Privacy Protection Scheme

Yuzhen Liu, Xiaoliang Wang, Zhoulei Cao, Frank Jiang
2022 Journal of Cyber Security  
We propose a scheme based on fair blind signature and secret sharing algorithm. In this paper, we prove that the scheme is feasible through security analysis.  ...  Using such an authentication scheme, every RSU can verify more than 26000 signatures per second simultaneously with the assistance of some proxy vehicles.  ...  To change the one by one verification way between vehicles, Lee [4] propose a batch authentication scheme for VANETs. They use a bilinear pairing to verify the vehicles' identities.  ... 
doi:10.32604/jcs.2022.028792 fatcat:xtcobeqz5ncvrpfv5ycqwc2x7a


H. Ateeq Ahmed .
2015 International Journal of Research in Engineering and Technology  
We considered the role of threshold cryptography to provide advanced security for the MANETs, revealing the authorization process using threshold digital signature, proxy signature and multi-signature  ...  One of the challenging issues for such environments is secure authentication.  ...  This paper presents a significantly improved construction and a complete rewrite and evaluation of our implementation that can significantly improves the overall concept of security for MANETs by using threshold  ... 
doi:10.15623/ijret.2015.0414011 fatcat:6uin7y72hfbpbei4bwpovamtjq

A Fully Distributed Proactively Secure Threshold-Multisignature Scheme

Johann Van Der Merwe, Dawoud S. Dawoud, Stephen McDonald
2007 IEEE Transactions on Parallel and Distributed Systems  
Threshold-multisignature schemes combine the properties of threshold group-oriented signature schemes and multisignature schemes to yield a signature scheme that allows a threshold ðtÞ or more group members  ...  The round optimal DKRU protocol solves a major problem with existing secret redistribution/updating schemes by giving group members a mechanism to identify malicious or faulty share holders in the first  ...  The set ðR; SÞ will be a universally forged signature on the arbitrary message m, verifiable with the group-oriented signature verification equation, g SR ¼ R ðRþhðmÞÞ y mod p.  ... 
doi:10.1109/tpds.2007.1005 fatcat:a5rjvg6lh5c3jo3kzz45zg7kau

Detecting Sybil Attacks using Proofs of Work and Location in VANETs [article]

Mohamed Baza, Mahmoud Nabil, Niclas Bewermeier, Kemal Fidan, Mohamed Mahmoud, Mohamed Abdallah
2019 arXiv   pre-print
Extensive experiments and simulations demonstrate that our scheme achieves high detection rate to Sybil attacks with low false negative and acceptable communication and computation overhead.  ...  In this paper, we propose a Sybil attack detection scheme using proofs of work and location.  ...  A brief description to the threshold signature scheme is as follows.  ... 
arXiv:1904.05845v1 fatcat:xrnzracqjndqxp3qp7yrhj42gy

An efficient ECC-based mechanism for securing network coding-based P2P content distribution

Heng He, Ruixuan Li, Zhiyong Xu, Weijun Xiao
2013 Peer-to-Peer Networking and Applications  
The two schemes cooperate to thwart pollution attacks on network coding effectively in P2P networks, not only detecting corrupted blocks on-the-fly efficiently, but also precisely identifying all the malicious  ...  Security analysis demonstrates that ESNC can resist hash collision attacks, signature forgery attacks, and collusion attacks with arbitrary number of colluding malicious peers.  ...  Hence, the proposed network coding signature scheme can efficiently verify blocks on-the-fly with low computation overheads.  ... 
doi:10.1007/s12083-013-0239-x fatcat:6ma2ooczl5bohgzdowcyazxjqe


2020 International Journal of Engineering Technology and Management Sciences  
These networks often suffer with a problem of Malicious attacks from different types of attackers.  ...  Mobile Ad Hoc is a network connection method which is most often associated with wireless devices. The connection is established for the duration of one session and requires no base station.  ...  To make threshold signature scheme more secure against malicious acts, [1] proposed the verifiable IP-address binding with public key. Each square region has a specific number of nodes=N.  ... 
doi:10.46647/ijetms.2020.v04i05.008 fatcat:4vdvqs6hfzhttl6ms3zlirs3q4

An efficient incentive scheme with a distributed authority infrastructure in peer-to-peer networks

Zhan Zhang, Shigang Chen, Zhen Mo, MyungKeun Yoon
2012 Journal of Parallel and Distributed Computing  
Such malicious nodes/collusions are difficult to detect, especially in a large network without a centralized authority.  ...  The proposed scheme includes three major components: a distributed authority infrastructure, a key sharing protocol, and a contract verification protocol.  ...  infrastructure to manage the nodes' history information with low overhead and high security. (3) We design a key sharing protocol and a contract verification protocol based on the threshold cryptography  ... 
doi:10.1016/j.jpdc.2012.08.003 fatcat:pjmaclaxfjfj3deetvz2s3o2bi

Dynamic Cluster Based Intrusion Detection Architecture to Detect Routing Protocol Attacks in MANET

Sarika Patil
2014 International Journal of Sensor Networks and Data Communications  
By using the schemes of EAACK we propose a cooperative, dynamic hierarchical intrusion detection architecture that addresses these challenges while finding specific and conventional attacks in MANET.  ...  The usefulness of the architecture is demonstrated via black hole attack scenarios in which attack is detected and removed.  ...  H (msg')=d' 5) Eve can verify the signature by applying Bob's public key. Figure 1 a 1 ) Shows flow of ACK scheme. Figure 1 : 1 Flowchart of EAACK Schemes a) ACK b) S-ACK.  ... 
doi:10.4172/2090-4886.1000116 fatcat:sx67p272lbgfhjk7sxa2buh2ce

Scaling VANET security through cooperative message verification

Hongyu Jin, Panos Papadimitratos
2015 2015 IEEE Vehicular Networking Conference (VNC)  
VANET security introduces significant processing overhead for resource-constrained On-Board Units (OBUs).  ...  Here, we propose a novel scheme that allows secure Vehicular Communication (VC) systems to scale well beyond network densities for which existing optimization approaches could be workable, without compromising  ...  P r check has an impact on the probability of bogus message (thus, malicious node) detection and the waiting time distribution: more signatures need to be verified for higher P r check .  ... 
doi:10.1109/vnc.2015.7385588 dblp:conf/vnc/JinP15 fatcat:hnfgywxaqzfz3j32mkrbtvashm

Broadcast Message Authentication Mechanism to Detect Clone and Sybil attacks in VANET's based on ID-Based Signature Scheme

Kareemulla Shaik, Md. Ali Hussain
2018 International Journal of Engineering & Technology  
In this paper we propose a secure broadcast message authentication and attack detection mechanism with Identity – Based Signatures.  ...  Our scheme shown best performance compared to existing schemes in terms of packet delivery ration, detection rate and detection time.  ...  This technique is based on an identity-based signature approach along with malicious attack detection scheme.  ... 
doi:10.14419/ijet.v7i3.12.17770 fatcat:ln4ruhibf5f6lmvlecft7cmxim

A verifiable E-voting scheme with secret sharing

Lifeng Yuan, Mingchu Li, Cheng Guo, Weitong Hu, Xing Tan
2015 2015 IEEE 16th International Conference on Communication Technology (ICCT)  
In this paper, we propose a distributed and verifiable e-voting scheme based on Mignotte's threshold secret sharing scheme, which effectively balances the conflict of interest between voters and count  ...  Additionally, this scheme can also resist potential attacks from malicious participants, and satisfy special requirements of e-voting, especially for privacy and accountability, which contradict each other  ...  Our scheme uses Mignotte's threshold secret sharing technique, which is based on the Chinese Remainder Theorem.  ... 
doi:10.1109/icct.2015.7399848 fatcat:j65rp2qdl5fo7husymwp3zvwhe

Improving security and efficiency of enterprise digital rights management

Ahmed H. Soliman, Maged H. Ibrahim, Adel E. El-Hennawy
2015 2015 6th International Conference on Computing, Communication and Networking Technologies (ICCCNT)  
Digital files containing sensitive information should be protected against external and internal malicious attacks.  ...  Keywords-enterprise digital rights management, information dispersal, secure storage, efficient reliable storage, threshold decryption B.  ...  This increases the security of the decryption key against up to t malicious servers. The first practical threshold decryption scheme was proposed by Desmedt et al.  ... 
doi:10.1109/icccnt.2015.7395177 fatcat:yudtonlnxncrdozcsmr5pz6jtq

On-demand public-key management for mobile ad hoc networks

Ruidong Li, Jie Li, Peng Liu, Hsiao-Hwa Chen
2006 Wireless Communications and Mobile Computing  
OPKM makes use of broadcasting technology and digital signature mechanism to provide key management service on demand, while protecting the certificate distribution against man-in-the-middle attacks.  ...  In this paper, we present Ondemand Public Key Management (OPKM), a novel public key management scheme for wireless ad hoc networks.  ...  During the multi-hop certificate distribution, such malicious modification can be detected via a following intermediate node verifying digital signatures of its neighbours within two hops. i → N 1 (i):  ... 
doi:10.1002/wcm.396 fatcat:pg6ax65iljgo3ayeq7saydgsre
« Previous Showing results 1 — 15 out of 4,994 results