Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks
B Bhushan, G Sahoo - Wireless Personal Communications, 2018 - Springer
Advances in hardware manufacturing technology, wireless communications, micro electro-
mechanical devices and information processing technologies enabled the development of …
mechanical devices and information processing technologies enabled the development of …
A survey of attack and defense techniques for reputation systems
Reputation systems provide mechanisms to produce a metric encapsulating reputation for a
given domain for each identity within the system. These systems seek to generate an …
given domain for each identity within the system. These systems seek to generate an …
Sybillimit: A near-optimal social network defense against sybil attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable
to sybil attacks, where a malicious user pretends to have multiple identities (called sybil …
to sybil attacks, where a malicious user pretends to have multiple identities (called sybil …
Sybilguard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly
vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities …
vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities …
Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges
Internet of things (IoT) is a contemporary technology, which links a tremendous number of
devices with each other to ease the life via many useful services such as information …
devices with each other to ease the life via many useful services such as information …
Sybilguard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly
vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities …
vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities …
A survey of DHT security techniques
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable
attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been …
attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been …
Dsybil: Optimal sybil-resistance for recommendation systems
Recommendation systems can be attacked in various ways, and the ultimate attack form is
reached with a\em sybil attack, where the attacker creates a potentially unlimited number …
reached with a\em sybil attack, where the attacker creates a potentially unlimited number …
Proof of work without all the work
Proof-of-work (PoW) is an algorithmic tool used to secure networks by imposing a
computational cost on participating devices. Unfortunately, traditional PoW schemes require …
computational cost on participating devices. Unfortunately, traditional PoW schemes require …
Sybil defenses via social networks: a tutorial and survey
H Yu - ACM SIGACT News, 2011 - dl.acm.org
The sybil attack in distributed systems refers to individual malicious users joining the system
multiple times under multiple fake identities. Sybil attacks can easily invalidate the …
multiple times under multiple fake identities. Sybil attacks can easily invalidate the …