Detecting sybil attacks in vehicular ad hoc networks using fuzzy logic and arithmetic optimization algorithm

M Maleknasab Ardakani, MA Tabarzad… - The Journal of …, 2022 - Springer
… arithmetic optimization algorithm (AOA). In this context, AOA is a new metaheuristic algorithm,
… AOA algorithm can be applied to conduct the optimization procedure in a broad variety of …

An improved localization approach based on Sybil attack for WSN

L Zheng - Physical Communication, 2024 - Elsevier
… The aim of this paper is to improve the accuracy of localization of algorithms based on
chicken swarm optimization, while also achieving faster convergence. Our goal is to refine the …

SybilACO: Ant colony optimization in defending against Sybil attacks in the wireless Sensor Network

B Zeng, B Chen - 2010 International Conference on Computer …, 2010 - ieeexplore.ieee.org
… influence of Sybil attack, including three orthogonal dimensions [5]: direct … , an algorithm
aimed at detecting Sybil attacks against peer-to-peer networks and limit the number of attack

Sybil attack with RSU detection and location privacy in urban VANETs: An efficient EPORP technique

NC Velayudhan, A Anitha, M Madanan - Wireless Personal …, 2022 - Springer
Optimization-based Routing protocol (EPORP) is developed for detecting the Sybil attack
The main motive of the research is detecting the Sybil attack in VANETs for enhancing the …

A lightweight intrusion detection for sybil attack under mobile RPL in the internet of things

S Murali, A Jamalipour - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
… of Sybil attack based on its behavior, and we analyze the performance of the RPL under the
Sybil attack … Also, D-Trickle timer has been used to optimize the number of control message …

[PDF][PDF] Detection and Optimisation Techniques against Sybil Attack on MANET

SA Kaur, SG Vashist - … Journal of Advanced Research in Computer …, 2014 - researchgate.net
… a optimization technique that is Genetic Algorithm (GA). In the end it has been proposed
that a Hybrid algorithm can be developed that will overcome the limitations of AES and RC5. …

Defense against sybil attacks in directed social networks

P Liu, X Wang, X Che, Z Chen… - 2014 19th international …, 2014 - ieeexplore.ieee.org
… based on the set of measures and iterative optimization to detect the sybil region. The … an
attacking model known as sybil attack [7], address that spammers might follow such attacking

A mechanism of preventing sybil attack in manet using bacterial foraging optimization

S Mahajan, N Dahiya, D Kumar - 2016 Thirteenth International …, 2016 - ieeexplore.ieee.org
… It is the type of attack in which it is assumed that relay packets has been supposed but … , is
requirement of optimization through which we can secure the network from Sybil attack [2] [3]. …

Enhancing security in online social networks: introducing the DeepSybil model for Sybil attack detection

B Antony, S Revathy - Multimedia Tools and Applications, 2024 - Springer
… To address this issue, this paper proposes the DeepSybil model, which utilizes the
Gannet Optimization Algorithm (GOA) and Graph Attention Networks (GATs) to detect …

The sybil attack in sensor networks: analysis & defenses

J Newsome, E Shi, D Song, A Perrig - Proceedings of the 3rd …, 2004 - dl.acm.org
… investigate the Sybil attack, a particularly harmful attack in sensor networks. In the Sybil attack,
… Similar methods of choosing keys have been proposed before as an optimization [15]; We …