Privacy and security in online social networks: A survey

I Kayes, A Iamnitchi - Online Social Networks and Media, 2017 - Elsevier
Online social networks (OSN) are a permanent presence in today's personal and
professional lives of a huge segment of the population, with direct consequences to offline …

LSB: A Lightweight Scalable Blockchain for IoT security and anonymity

A Dorri, SS Kanhere, R Jurdak… - Journal of Parallel and …, 2019 - Elsevier
In recent years, Blockchain has attracted tremendous attention due to its salient features
including auditability, immutability, security, and anonymity. Resulting from these salient …

Preventing sybil attack in blockchain using distributed behavior monitoring of miners

P Swathi, C Modi, D Patel - 2019 10th international conference …, 2019 - ieeexplore.ieee.org
Blockchain technology is useful with the record kee** of digital transactions, IoT, supply
chain management etc. However, we have observed that the traditional attacks are possible …

Sybildefender: Defend against sybil attacks in large social networks

W Wei, F Xu, CC Tan, Q Li - 2012 proceedings ieee infocom, 2012 - ieeexplore.ieee.org
Distributed systems without trusted identities are particularly vulnerable to sybil attacks,
where an adversary creates multiple bogus identities to compromise the running of the …

SybilDefender: A defense mechanism for sybil attacks in large social networks

W Wei, F Xu, CC Tan, Q Li - IEEE transactions on parallel and …, 2013 - ieeexplore.ieee.org
Distributed systems without trusted identities are particularly vulnerable to sybil attacks,
where an adversary creates multiple bogus identities to compromise the running of the …

An enhanced sybil guard to detect bots in online social networks

NP Shetty, B Muniyal, A Anand… - Journal of Cyber …, 2022 - journals.riverpublishers.com
Sybil accounts are swelling in popular social networking sites such as Twitter, Facebook etc.
owing to cheap subscription and easy access to large masses. A malicious person creates …

Neighbor similarity trust against sybil attack in P2P e-commerce

G Wang, F Musau, S Guo… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Peer to peer (P2P) e-commerce applications exist at the edge of the Internet with
vulnerabilities to passive and active attacks. These attacks have pushed away potential …

Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model

MB Shareh, H Navidi, HHS Javadi… - Information Sciences, 2019 - Elsevier
Abstract In cooperative Peer-to-Peer (P2P) networks, a number of users, called Free-riders,
try to receive service from others without cooperating with them. Some others, called Sybil …

Sybil-proof diffusion auction in social networks

H Chen, X Deng, Y Wang, Y Wu, D Zhao - arxiv preprint arxiv:2211.01984, 2022 - arxiv.org
A diffusion auction is a market to sell commodities over a social network, where the
challenge is to incentivize existing buyers to invite their neighbors in the network to join the …

Review on detection and mitigation of Sybil attack in the network

AM Bhise, SD Kamble - Procedia Computer Science, 2016 - Elsevier
Sybil attack is an attack in which the identities of the node are subverted and the large
number of pseudonymous identities is produced to gain the access of the network. In this …