Javascript must be enabled to continue!
A Survey: Detection and Mitigation Techniques of Sybil in the Networks
View through CrossRef
Wireless networks are complicated to put together, and the more people use them over time, the more complicated they become. Wireless networks are made up of many different types of technology, which means they have vulnerabilities. One vulnerability is that they are easily spoofed or impersonated by Sybil attacks. In a Sybil attack, the attacker disguises themselves as someone else and generates various identities to have access to the system. This type of attack is typically accomplished by creating multiple fake user accounts. The attacker then uses these fake accounts to promote their content or ideas, vote for their own content or ideas, and/or harass other users. Since wireless networks are very resource-constrained, it is vital to develop more efficient and lightweight trustworthy security mechanisms to identify & track Sybil attacks as these are a major concern for the stability or security of the network. There are some security schemes for prevention against Sybil attacks, like cryptography, privacy-preserving solutions and lightweight authentication. Cryptography and privacy-preserving techniques require key management and additional infrastructure overhead, which makes them difficult to establish and maintain in a limited resource environment. The lightweight trusted system detects & avoids single node and multi-node attacks under different conditions. In this paper, a survey is conducted on various techniques for the detection of Sybil attacks.
Auricle Technologies, Pvt., Ltd.
Title: A Survey: Detection and Mitigation Techniques of Sybil in the Networks
Description:
Wireless networks are complicated to put together, and the more people use them over time, the more complicated they become.
Wireless networks are made up of many different types of technology, which means they have vulnerabilities.
One vulnerability is that they are easily spoofed or impersonated by Sybil attacks.
In a Sybil attack, the attacker disguises themselves as someone else and generates various identities to have access to the system.
This type of attack is typically accomplished by creating multiple fake user accounts.
The attacker then uses these fake accounts to promote their content or ideas, vote for their own content or ideas, and/or harass other users.
Since wireless networks are very resource-constrained, it is vital to develop more efficient and lightweight trustworthy security mechanisms to identify & track Sybil attacks as these are a major concern for the stability or security of the network.
There are some security schemes for prevention against Sybil attacks, like cryptography, privacy-preserving solutions and lightweight authentication.
Cryptography and privacy-preserving techniques require key management and additional infrastructure overhead, which makes them difficult to establish and maintain in a limited resource environment.
The lightweight trusted system detects & avoids single node and multi-node attacks under different conditions.
In this paper, a survey is conducted on various techniques for the detection of Sybil attacks.
Related Results
Product Recommendation based on Sybil and Trusted Votes in Social Networks
Product Recommendation based on Sybil and Trusted Votes in Social Networks
Social Networks is a platform which is easily accessible by normal users worldwide. Online Social Networks facilitates users online to get registered with ease of speed and create ...
Mitigation translocation for conservation of New Zealand skinks
Mitigation translocation for conservation of New Zealand skinks
<p>Worldwide, human development is leading to the expansion and intensification of land use, with increasing encroachment on natural habitats. A rising awareness of the delet...
MITIGATION OF DISASTER RISK REDUCTION IN PANGANDARAN REGENCY
MITIGATION OF DISASTER RISK REDUCTION IN PANGANDARAN REGENCY
The government has a function to protect its people, including managing the disaster. The function of government in natural disaster management is a function that is expected to be...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Depth-aware salient object segmentation
Depth-aware salient object segmentation
Object segmentation is an important task which is widely employed in many computer vision applications such as object detection, tracking, recognition, and ret...
Volumetric Benchmarking of Error Mitigation with Qermit
Volumetric Benchmarking of Error Mitigation with Qermit
The detrimental effect of noise accumulates as quantum computers grow in size. In the case where devices are too small or noisy to perform error correction, error mitigation may be...
Advanced frameworks for fraud detection leveraging quantum machine learning and data science in fintech ecosystems
Advanced frameworks for fraud detection leveraging quantum machine learning and data science in fintech ecosystems
The rapid expansion of the fintech sector has brought with it an increasing demand for robust and sophisticated fraud detection systems capable of managing large volumes of financi...
Mitigating DDoS Attacks in Cloud Networks
Mitigating DDoS Attacks in Cloud Networks
Distributed Denial of Service (DDoS) attacks represent a significant and growing threat to cloud networks, capable of causing extensive service disruptions and substantial financia...

