Detecting sybil attack in vehicular ad-hoc networks (vanets) by using fitness function, signal strength index and throughput

SS Sefati, SG Tabrizi - Wireless Personal Communications, 2022 - Springer
fitness function of these parameters is beyond the determined limit, nodes will continue to
work. In this paper detected Sybil attacks … with PDF (probability density function), FCVS (Fuzzy-…

An improved localization approach based on Sybil attack for WSN

L Zheng - Physical Communication, 2024 - Elsevier
… Although O(k*NP1) is required as extra time due to the fitness function calculation for the
PSO-based algorithms. O(k*NP2) is needed for the CSO-based proposed algorithms, …

Sybil attack in RPL-based internet of things: analysis and defenses

C Pu - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
… is modeled into five phases, namely, the initialization phase, the fitness factor computation,
the compromising or fabricating phase, the contagious phase, and the hive selection and …

Solving sybil attacks using evolutionary game theory

F Saab, A Kayssi, I Elhajj, A Chehab - Proceedings of the 31st Annual …, 2016 - dl.acm.org
… Our results show that under certain conditions that are easily achievable by a system
administrator, the probability of an attack strategy drops to zero implying degraded fitness for …

Detecting sybil attacks in vehicular ad hoc networks using fuzzy logic and arithmetic optimization algorithm

M Maleknasab Ardakani, MA Tabarzad… - The Journal of …, 2022 - Springer
… of the other vehicles to launch its attacks and it uses their identities which these … Sybil attack,
the vehicle that conducts the attack and impersonates other vehicles is denoted as the Sybil

Playing with sybil

F Saab, A Kayssi, I Elhajj, A Chehab - ACM SIGAPP Applied Computing …, 2016 - dl.acm.org
… of an attack strategy drops to zero implying degraded fitness for Sybils that eventually die out.
… We model the Sybil attack as a game between two populations. The first population is the …

A lightweight intrusion detection for sybil attack under mobile RPL in the internet of things

S Murali, A Jamalipour - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Sybil attack based on its behavior, and we analyze the performance of the RPL under the
Sybil attack … attempts to select any arbitrary node based on the following five fitness evaluation …

[PDF][PDF] Genetic algorithm enabled prevention of sybil attacks for LEACH-E

R Amuthavalli, RS Bhuvaneswaran - Modern Applied Science, 2015 - researchgate.net
… not fit to the fitness function, is considered to be the Sybil node. … energy efficiency by identifying
the Sybil nodes to the optimizer… trusted neighbor nodes using the GA fitness function. The …

Sybil attack with RSU detection and location privacy in urban VANETs: An efficient EPORP technique

NC Velayudhan, A Anitha, M Madanan - Wireless Personal …, 2022 - Springer
… Finally, with the utilization of the proposed EPO algorithm, the optimal key generation of
SXOR operation is computed based on the fitness function. The optimal key generation can …

Detecting sybil attacks in VANETs

B Yu, CZ Xu, B Xiao - Journal of Parallel and Distributed Computing, 2013 - Elsevier
Sybil attacks have been regarded as a serious … Sybil attacks by analyzing signal strength
distribution. First, we propose a cooperative method to verify the positions of potential Sybil