Combating Sybil Attacks using SybilGuard
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 2
Abstract
This paper presents a Sybil Guard, for combating against Sybil attacks without relying on a trusted central authority. Peer-to-peer and other decentralized, distributed systems are known to be particularly open to Sybil attacks. In aSybil attack, a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. Among the small number of decentralized approaches, our recent SybilGuard leverages a key insight on social networks to bind the number of Sybil nodes accepted. Despite its promising direction, SybilGuard can allow a large number of Sybil nodes to be accepted. Furthermore, Sybil Guard assumes that socialnetworks are fast-mixing, which has never been confirmed in the real world. SybilGuard exploits this property to bind the number of identities a malicious user can create. Sybil Guard offers dramatically improved and near optimal guarantees.
Authors and Affiliations
Abhijeet B. Potey , Prof. Anjali B. Raut
Doctor friendly software for HRV Analysis
This paper discusses about the development of HRV analysis software using VB and MATLAB easy to be used and understand by the doctors. The developed software provides user friendly GUI which provides the doctors...
Optimization of PID Controller for Quarter-Car Suspension System using Genetic Algorithm
In order to improve the ride comfort and stability by reducing the body acceleration in vehicles caused by the road irregularities, suspension system plays an imperative role in retaining the continuous road wheel...
A Combined Approach to Part-of-Speech Tagging Using Features Extraction and Hidden Markov Model
Words are characterized by its features. In an inflectional language, category of a word can be express by its tense, aspect and modality (TAM). Extracting features from an inflected word, one can categorised it wi...
Web usage mining: Review on preprocessing of web log file
Web log data is one of the major source which contain all the information regarding the users visited links browsing pattern, time spent on a particular page. A web server log file contain information about user nam...
erformance Analysis on Learning Algorithms with various Facial Expressions in Spiking Neural Networks
This paper is based on different expression classification and facial action recognition performed using human face database. This work aims to classify different facial expressions of the individuals from the st...