Prevention Techniques for Sybil Attack
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 11, Issue 10
Abstract
Mobile ad-hoc network is a self-governing network, consists of group of nodes that communicates with each other through wireless links. As it is a wireless network, so it is subjected to various attacks. There is one attack which is very dangerous called Sybil attack. In Sybil attack, attackers or malicious nodes uses multiple identities to disrupt the communication between the nodes by capturing necessary and important information and creating misunderstandings between the nodes. In this paper some measures are described to prevent Sybil attack.
Authors and Affiliations
Roopali Garg, Himika Sharma
Some aspects of Routing Protocols at Wireless Sensor Networks
In this paper we give an overview of some routing protocols which can improve the efficiency and scalability of wireless sensor networks. The Wireless Sensor Network (WSN) is a network consisting of ten to thousand small...
IMPEMENTATION OF DATA WATCHER IN DATA LEAKAGE DETECTION SYSTEM
Now days, every company is facing data leakage. That is very serious problem faced by company. An owner of enterprise has given confidential data to its employee but most of the time employee leaks the data. That leak...
An Efficient Multi Parent Hierarchical Routing Protocol for WSN’s
Wireless sensor networks (WSNs) nodes are commonly designed to work with limited resources of memory, energy and processing. The routing protocol is one of the key components of WSNs and its features impact network perfo...
Modified Ant Colony Optimization for Workflow Scheduling in Cloud Enviornment
Cloud computing is a type of parallel and distributed system consisting of a collection of interconnected and virtual computers. This technological trend has enabled the realization of a new computing model called cloud...
Security Test by using F T M and Data Allocation Strategies on Leakage Detection
The data distributors work is to give sensitive data to a set of presumably trusted third party agents.The data i.e., sent to these third parties are available on the unauthorized places like web and or some ones systems...