DocumentCode :
3668011
Title :
A survey of techniques to prevent sybil attacks
Author :
RincyMedayil John;Jacob P. Cherian;Jubilant J Kizhakkethottam
Author_Institution :
Dept. of Computer Science and Engineering, St. Joseph´s College of Engineering and Technology, Palai, Kerala, India
fYear :
2015
Firstpage :
1
Lastpage :
6
Abstract :
Any decentralized, distributed network isvulnerable to the Sybil attack wherein a malicious node masquerade as several different nodes, called Sybil nodes disrupting the proper functioning of the network. A Sybil attacker can create more than one identity on a single physical device in order to launch a coordinated attack on the network or can switch identities in order to weaken the detection process, thus promoting lack of accountability in the network. In this paper, different types of Sybil attacks, including those occurring in peer-to-peer reputation systems, self-organizing networks and social network systems are discussed. Also, various methods that have been suggested over time to decrease or eliminate their risk completely are also analysed.
Keywords :
"Peer-to-peer computing","Ad hoc networks","Wireless sensor networks","Access control","Computers","Social network services"
Publisher :
ieee
Conference_Titel :
Soft-Computing and Networks Security (ICSNS), 2015 International Conference on
Print_ISBN :
978-1-4799-1752-5
Type :
conf
DOI :
10.1109/ICSNS.2015.7292385
Filename :
7292385
Link To Document :
بازگشت