Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks

B Bhushan, G Sahoo - Wireless Personal Communications, 2018 - Springer
Advances in hardware manufacturing technology, wireless communications, micro electro-
mechanical devices and information processing technologies enabled the development of …

A survey of attack and defense techniques for reputation systems

K Hoffman, D Zage, C Nita-Rotaru - ACM Computing Surveys (CSUR), 2009 - dl.acm.org
Reputation systems provide mechanisms to produce a metric encapsulating reputation for a
given domain for each identity within the system. These systems seek to generate an …

Sybillimit: A near-optimal social network defense against sybil attacks

H Yu, PB Gibbons, M Kaminsky… - 2008 IEEE Symposium …, 2008 - ieeexplore.ieee.org
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable
to sybil attacks, where a malicious user pretends to have multiple identities (called sybil …

Sybilguard: defending against sybil attacks via social networks

H Yu, M Kaminsky, PB Gibbons… - Proceedings of the 2006 …, 2006 - dl.acm.org
Peer-to-peer and other decentralized, distributed systems are known to be particularly
vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities …

Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges

AIA Ahmed, SH Ab Hamid, A Gani, MK Khan - Journal of Network and …, 2019 - Elsevier
Internet of things (IoT) is a contemporary technology, which links a tremendous number of
devices with each other to ease the life via many useful services such as information …

Sybilguard: defending against sybil attacks via social networks

H Yu, M Kaminsky, PB Gibbons… - IEEE/ACM Transactions …, 2008 - ieeexplore.ieee.org
Peer-to-peer and other decentralized, distributed systems are known to be particularly
vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities …

A survey of DHT security techniques

G Urdaneta, G Pierre, MV Steen - ACM Computing Surveys (CSUR), 2011 - dl.acm.org
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable
attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been …

Dsybil: Optimal sybil-resistance for recommendation systems

H Yu, C Shi, M Kaminsky, PB Gibbons… - 2009 30th IEEE …, 2009 - ieeexplore.ieee.org
Recommendation systems can be attacked in various ways, and the ultimate attack form is
reached with a\em sybil attack, where the attacker creates a potentially unlimited number …

Proof of work without all the work

D Gupta, J Saia, M Young - … of the 19th international conference on …, 2018 - dl.acm.org
Proof-of-work (PoW) is an algorithmic tool used to secure networks by imposing a
computational cost on participating devices. Unfortunately, traditional PoW schemes require …

Sybil defenses via social networks: a tutorial and survey

H Yu - ACM SIGACT News, 2011 - dl.acm.org
The sybil attack in distributed systems refers to individual malicious users joining the system
multiple times under multiple fake identities. Sybil attacks can easily invalidate the …