Academic literature on the topic 'Sybil attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Sybil attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Sybil attack"

1

Zulfahmi Helmi, Ramzi Adriman, Teuku Yuliar Arif, Hubbul Walidainy, and Maya Fitria. "Sybil Attack Prediction on Vehicle Network Using Deep Learning." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 6, no. 3 (2022): 499–504. http://dx.doi.org/10.29207/resti.v6i3.4089.

Full text
Abstract:
Vehicular Ad Hoc Network (VANET) or vehicle network is a technology developed for autonomous vehicles in Intelligent Transportation Systems (ITS). The communication system of VANET is using a wireless network that is potentially being attacked. The Sybil attack is one of the attacks that occur by broadcasting spurious information to the nodes in the network and could cause a crippled network. The Sybil strikes the network by camouflaging themselves as a node and providing false information to nearby nodes. This study is conducted to predict the Sybil attack by analyzing the attack pattern usin
APA, Harvard, Vancouver, ISO, and other styles
2

Zhou, Chuanxin, Yi Sun, Degang Wang, and Qi Gao. "Fed-Fi: Federated Learning Malicious Model Detection Method Based on Feature Importance." Security and Communication Networks 2022 (May 18, 2022): 1–11. http://dx.doi.org/10.1155/2022/7268347.

Full text
Abstract:
Federated learning, as a new security exchange paradigm, is widely used in medical care, driverless cars, finance, and other fields. However, federated learning still faces the problem of sybil attacks common in distributed frameworks. The existing schemes mainly defend against malicious model attacks with distance comparison, neural network, and confidence vote. But they are significantly limited in dealing with collusive sybil attacks. Therefore, we propose a federated learning malicious model detection method based on feature importance (Fed-Fi). Firstly, we screen important features by fea
APA, Harvard, Vancouver, ISO, and other styles
3

Saud Khan, M., and Noor M. Khan. "Low Complexity Signed Response Based Sybil Attack Detection Mechanism in Wireless Sensor Networks." Journal of Sensors 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/9783072.

Full text
Abstract:
Security is always a major concern in wireless sensor networks (WSNs). Identity based attacks such as spoofing and sybil not only compromise the network but also slow down its performance. This paper proposes a low complexity sybil attack detection scheme, that is, based on signed response (SRES) authentication mechanism developed for Global System for Mobile (GSM) communications. A probabilistic model is presented which analyzes the proposed authentication mechanism for its probability of sybil attack. The paper also presents a simulation based comparative analysis of the existing sybil attac
APA, Harvard, Vancouver, ISO, and other styles
4

Singhal, Prateek, Puneet Sharma, and Deepak Arora. "An approach towards preventing iot based sybil attack based on contiki framework through cooja simulator." International Journal of Engineering & Technology 7, no. 2.8 (2018): 261. http://dx.doi.org/10.14419/ijet.v7i2.8.10421.

Full text
Abstract:
In this paper we propagate the Sybil attack in WSN (Wireless sensor network), by the researchers many attacks have been recognized in WSN till now and there are many attacks which can attack over through internet, Internet of thing means all devices is interconnected to each other M2M over internet and can be attacked by any of the attacker on any devices. Sybil attack is the detrimental attack against sensor network where several counterfeit identities and legitimate identities are used to get prohibited pass in a network. This is major attack which results an information loss and misinterpre
APA, Harvard, Vancouver, ISO, and other styles
5

Garg, Roopali, and Himika Sharma. "Prevention Techniques for Sybil Attack." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 10 (2012): 3060–64. http://dx.doi.org/10.24297/ijct.v11i10.2974.

Full text
Abstract:
Mobile ad-hoc network is a self-governing network, consists of group of nodes that communicates with each other through wireless links. As it is a wireless network, so it is subjected to various attacks. There is one attack which is very dangerous called Sybil attack. In Sybil attack, attackers or malicious nodes uses multiple identities to disrupt the communication between the nodes by capturing necessary and important information and creating misunderstandings between the nodes. In this paper some measures are described to prevent Sybil attack.
APA, Harvard, Vancouver, ISO, and other styles
6

Dhamodharan, Udaya Suriya Raj Kumar, and Rajamani Vayanaperumal. "Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method." Scientific World Journal 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/841267.

Full text
Abstract:
Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Com
APA, Harvard, Vancouver, ISO, and other styles
7

Chang, Shih-Hao, and Zhi-Rong Chen. "Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System." Mobile Information Systems 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/6506341.

Full text
Abstract:
Mobile crowd sensing (MCS) arises as a new sensing paradigm, which leverages citizens for large-scale sensing by various mobile devices to efficiently collect and share local information. Unlike other MCS application challenges that consider user privacy and data trustworthiness, this study focuses on the network trustworthiness problem, namely, Sybil attacks in MCS network. The Sybil attack in computer security is a type of security attack, which illegally forges multiple identities in peer-to-peer networks, namely, Sybil identities. These Sybil identities will falsify multiple identities tha
APA, Harvard, Vancouver, ISO, and other styles
8

Arshad, Akashah, Zurina Mohd Hanapi, Shamala Subramaniam, and Rohaya Latip. "A survey of Sybil attack countermeasures in IoT-based wireless sensor networks." PeerJ Computer Science 7 (September 22, 2021): e673. http://dx.doi.org/10.7717/peerj-cs.673.

Full text
Abstract:
Wireless sensor networks (WSN) have been among the most prevalent wireless innovations over the years exciting new Internet of Things (IoT) applications. IoT based WSN integrated with Internet Protocol IP allows any physical objects with sensors to be connected ubiquitously and send real-time data to the server connected to the Internet gate. Security in WSN remains an ongoing research trend that falls under the IoT paradigm. A WSN node deployed in a hostile environment is likely to open security attacks such as Sybil attack due to its distributed architecture and network contention implemente
APA, Harvard, Vancouver, ISO, and other styles
9

Platt, Moritz, and Peter McBurney. "Sybil in the Haystack: A Comprehensive Review of Blockchain Consensus Mechanisms in Search of Strong Sybil Attack Resistance." Algorithms 16, no. 1 (2023): 34. http://dx.doi.org/10.3390/a16010034.

Full text
Abstract:
Consensus algorithms are applied in the context of distributed computer systems to improve their fault tolerance. The explosive development of distributed ledger technology following the proposal of “Bitcoin” led to a sharp increase in research activity in this area. Specifically, public and permissionless networks require robust leader selection strategies resistant to Sybil attacks in which malicious attackers present bogus identities to induce byzantine faults. Our goal is to analyse the entire breadth of works in this area systematically, thereby uncovering trends and research directions r
APA, Harvard, Vancouver, ISO, and other styles
10

Singh, Rupinder, Jatinder Singh, and Ravinder Singh. "Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/3548607.

Full text
Abstract:
In this paper, an Advanced Hybrid Intrusion Detection System (AHIDS) that automatically detects the WSNs attacks is proposed. AHIDS makes use of cluster-based architecture with enhanced LEACH protocol that intends to reduce the level of energy consumption by the sensor nodes. AHIDS uses anomaly detection and misuse detection based on fuzzy rule sets along with the Multilayer Perceptron Neural Network. The Feed Forward Neural Network along with the Backpropagation Neural Network are utilized to integrate the detection results and indicate the different types of attackers (i.e., Sybil attack, wo
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Sybil attack"

1

Tefera, Mismaku Hiruy. "Attacks on structured P2P overlay networks : Simulating Sybil Attacks." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-21166.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Saoud, Zohra. "Approche robuste pour l’évaluation de la confiance des ressources sur le Web." Thesis, Lyon, 2016. http://www.theses.fr/2016LYSE1331/document.

Full text
Abstract:
Cette thèse en Informatique s'inscrit dans le cadre de gestion de la confiance et plus précisément des systèmes de recommandation. Ces systèmes sont généralement basés sur les retours d'expériences des utilisateurs (i.e., qualitatifs/quantitatifs) lors de l'utilisation des ressources sur le Web (ex. films, vidéos et service Web). Les systèmes de recommandation doivent faire face à trois types d'incertitude liés aux évaluations des utilisateurs, à leur identité et à la variation des performances des ressources au fil du temps. Nous proposons une approche robuste pour évaluer la confiance en ten
APA, Harvard, Vancouver, ISO, and other styles
3

Vora, Adnan Zoeb. "Efficient Location Verification, Neighbor Discovery and Routing in Ad Hoc Wireless Networks." Kent State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=kent1254767819.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cappelleri, Vincenzo-Maria. "Randomness, Age, Work: Ingredients for Secure Distributed Hash Tables." Doctoral thesis, Università degli studi di Padova, 2017. http://hdl.handle.net/11577/3423231.

Full text
Abstract:
Distributed Hash Tables (DHTs) are a popular and natural choice when dealing with dynamic resource location and routing. DHTs basically provide two main functions: saving (key, value) records in a network environment and, given a key, find the node responsible for it, optionally retrieving the associated value. However, all predominant DHT designs suffer a number of security flaws that expose nodes and stored data to a number of malicious attacks, ranging from disrupting correct DHT routing to corrupting data or making it unavailable. Thus even if DHTs are a standard layer for some mainstream
APA, Harvard, Vancouver, ISO, and other styles
5

Martucci, Leonardo Augusto. "Identity and Anonymity in Ad Hoc Networks." Doctoral thesis, Karlstads universitet, Avdelningen för datavetenskap, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-3981.

Full text
Abstract:
In ad hoc networks every device is responsible for its own basic computer services, including packet routing, data forwarding, security, and privacy. Most of the protocols used in wired networks are not suitable for ad hoc networks, since they were designed for static environments with defined borders and highly specialized devices, such as routers, authentication servers, and firewalls. This dissertation concentrates on the achievement of privacy-friendly identifiersand anonymous communication in ad hoc networks. In particular, the objective is to offer means for better anonymous communicatio
APA, Harvard, Vancouver, ISO, and other styles
6

Cordeiro, Weverton Luis da Costa. "Limiting fake accounts in large-scale distributed systems through adaptive identity management." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2014. http://hdl.handle.net/10183/90442.

Full text
Abstract:
Sistemas online como Facebook, Twitter, Digg, e comunidades BitTorrent (entre vários outros) oferecem um processo leve para a obtenção de identidades (por exemplo, confirmar um endereço de e-mail válido; os requisitos podem variar dependendo do sistema), de modo que os usuários possam cadastrar-se facilmente nos mesmos. Tal conveniência vem com um preço, no entanto: com um pequeno esforço, um atacante pode obter uma grande quantidade de contas falsas (ataque Sybil), e utilizá-las para executar atividades maliciosas (que possam prejudicar os usuários legítimos) ou obter vantagens indevidas. É e
APA, Harvard, Vancouver, ISO, and other styles
7

Cholez, Thibault. "Supervision des réseaux pair à pair structurés appliquée à la sécurité des contenus." Phd thesis, Université Henri Poincaré - Nancy I, 2011. http://tel.archives-ouvertes.fr/tel-00608907.

Full text
Abstract:
L'objectif de cette thèse est de concevoir et d'appliquer de nouvelles méthodes de supervision capables d'appréhender les problèmes de sécurité affectant les données au sein des réseaux P2P structurés (DHT). Ceux-ci sont de deux types. D'une part les réseaux P2P sont utilisés pour diffuser des contenus illégaux dont l'activité est difficile à superviser. D'autre part, l'indexation des contenus légitimes peut être corrompue (attaque Sybil). Nous proposons tout d'abord une méthode de supervision des contenus basée sur l'insertion de sondes et le contrôle du mécanisme d'indexation du réseau. Cell
APA, Harvard, Vancouver, ISO, and other styles
8

Cholez, Thibault. "Supervision des réseaux pair à pair structurés appliquée à la sécurité des contenus." Electronic Thesis or Diss., Nancy 1, 2011. http://www.theses.fr/2011NAN10036.

Full text
Abstract:
L'objectif de cette thèse est de concevoir et d'appliquer de nouvelles méthodes de supervision capables d'appréhender les problèmes de sécurité affectant les données au sein des réseaux P2P structurés (DHT). Ceux-ci sont de deux types. D'une part les réseaux P2P sont utilisés pour diffuser des contenus illégaux dont l'activité est difficile à superviser. D'autre part, l'indexation des contenus légitimes peut être corrompue (attaque Sybil).Nous proposons tout d'abord une méthode de supervision des contenus basée sur l'insertion de sondes et le contrôle du mécanisme d'indexation du réseau. Celle
APA, Harvard, Vancouver, ISO, and other styles
9

Tan, Enhua. "Spam Analysis and Detection for User Generated Content in Online Social Networks." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1365520334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Barbu, Filimon. "Detection of and Prevention from Sybil Attacks in Internet of Things - a literature review." Thesis, Högskolan i Halmstad, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-30699.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Sybil attack"

1

author, Atteck Keith 1959, ed. Sybil Atteck: Artist : a brief biography. Hed Atteck, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Franklin, Alonzo. Your Ultimate Guide to Sybil Attack: Everything You Need to Know about Sybil Attacks Including the Types, Causes, Effects, and How to Avoid One. Independently Published, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Sybil attack"

1

Douceur, John R. "The Sybil Attack." In Peer-to-Peer Systems. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45748-8_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pattanayak, Binod Kumar, Omkar Pattnaik, and Sasmita Pani. "Dealing with Sybil Attack in VANET." In Smart Innovation, Systems and Technologies. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5971-6_51.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jeyasekar, A., S. Antony Sheela, and J. Ansulin Jerusha. "Outlier-Based Sybil Attack Detection in WSN." In IoT Based Control Networks and Intelligent Systems. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-5845-8_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Zhou, Yukun Cheng, Xiaotie Deng, Qi Qi, and Xiang Yan. "Limiting User’s Sybil Attack in Resource Sharing." In Web and Internet Economics. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71924-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Koleshwar, Ankita S., S. S. Sherekar, V. M. Thakare, and Aniruddha Kanhe. "Analytical Classification of Sybil Attack Detection Techniques." In Intelligent Data Communication Technologies and Internet of Things. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9509-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ma, Wei, Sen-Zhe Hu, Qiong Dai, Ting-Ting Wang, and Yin-Fei Huang. "Sybil-Resist: A New Protocol for Sybil Attack Defense in Social Network." In Applications and Techniques in Information Security. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45670-5_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ahlawat, Rohit Kumar, Amita Malik, and Archana Sadhu. "Sybil Attack Prevention Algorithm for Body Area Networks." In Nature Inspired Computing. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6747-1_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vinothini, C., J. Priya, P. Anitha, and T. S. Reshmi. "Detection of Sybil Attack in Internet of Things." In International Conference on Artificial Intelligence for Smart Community. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-2183-3_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fdil, EL Mehdi, and EL Mamoun Souidi. "Sybil Attack Detection in VANETs Using CatBoost Classifier." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62273-1_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Seigneur, Jean-Marc, Alan Gray, and Christian Damsgaard Jensen. "Trust Transfer: Encouraging Self-recommendations Without Sybil Attack." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11429760_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Sybil attack"

1

Yao, Xin, Kecheng Huang, and Ting Yao. "Universal Adversarial Attack for Sybil Detection System." In 2024 IEEE Conference on Communications and Network Security (CNS). IEEE, 2024. http://dx.doi.org/10.1109/cns62487.2024.10735590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tomar, Ashish. "A Blockchain-Based Scheme to Prevent the Sybil Attack in VANET." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724890.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Shengyu, Shenghao Jin, Yigang Wei, and Hui Zhang. "Sybil attack simulation on Enhanced IdAPoS protocol with different network topology." In 2024 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI). IEEE, 2024. https://doi.org/10.1109/iiki65561.2024.00029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Shubham, Hemant Chaudhari, Gaurav Shirsat, and Satyam Vishwakarma. "Leveraging Feed-Forward Neural Network to Identify Sybil Attack in Blockchain." In 2025 International Conference on Intelligent Systems and Computational Networks (ICISCN). IEEE, 2025. https://doi.org/10.1109/iciscn64258.2025.10934681.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sawant, Shankar M., and Vikas T. Ligade. "Novel Secure Routing Protocol for Detecting and Preventing Sybil Attack." In National Conference on Relevance of Engineering and Science for Environment and Society. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.118.55.

Full text
Abstract:
Secure communication network is the demand of today’s transportation due to excess number of vehicles and limitation to the existing communication protocol. This Paper discusses the secure communication protocol between the vehicles and the detection and prevention of the Sybil attack. Fake node request, multiple routing entries these are the common example of Sybil attack which can be detected and prevented using existing proposed method. Virtual nodes are created and messages are sent to nodes. The proposed method detects the identity of received message and number of fake entries of that pa
APA, Harvard, Vancouver, ISO, and other styles
6

Frey, Davide, Rachid Guerraoui, Anne-Marie Kermarrec, and Antoine Rault. "Collaborative filtering under a sybil attack." In the Eighth European Workshop. ACM Press, 2015. http://dx.doi.org/10.1145/2751323.2751328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sharma, Himika, and Roopali Garg. "Enhanced lightweight sybil attack detection technique." In 2014 5th International Conference- Confluence The Next Generation Information Technology Summit. IEEE, 2014. http://dx.doi.org/10.1109/confluence.2014.6949365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Newsome, James, Elaine Shi, Dawn Song, and Adrian Perrig. "The sybil attack in sensor networks." In the third international symposium. ACM Press, 2004. http://dx.doi.org/10.1145/984622.984660.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Guette, Gilles, and Bertrand Ducourthial. "On the Sybil attack detection in VANET." In 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems. IEEE, 2007. http://dx.doi.org/10.1109/mobhoc.2007.4428742.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rajan, Anjana, J. Jithish, and Sriram Sankaran. "Sybil attack in IOT: Modelling and defenses." In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2017. http://dx.doi.org/10.1109/icacci.2017.8126193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!