A novel classifier exploiting mobility behaviors for sybil detection in connected vehicle systems

Z Yang, K Zhang, L Lei, K Zheng - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
… In this section, we propose a Sybil detection scheme exploiting vehicle mobility behaviors.
Three methods are used to cope with the above three levels of Sybil attackers, as illustrated in …

Exploiting mobile social behaviors for sybil detection

K Zhang, X Liang, R Lu, K Yang… - 2015 IEEE Conference …, 2015 - ieeexplore.ieee.org
… of user’s mobile social behaviors, ie, pseudonym changing … mobile Sybil detection scheme
to detect mobile Sybil attackers according to their abnormal pseudonym changing behaviors. …

Intelligent Sybil attack detection on abnormal connectivity behavior in mobile social networks

A Chinchore, F Jiang, G Xu - … , KMO 2015, Maribor, Slovenia, August 24-28 …, 2015 - Springer
… In this research, the behavior survey of these nodes is carried out and further analysed with
the help of graph-based Sybil detection system. This paper particularly studies Sybil attacks …

You are where you have been: Sybil detection via geo-location analysis in OSNs

X Zhang, H Zheng, X Li, S Du… - 2014 IEEE Global …, 2014 - ieeexplore.ieee.org
… capture users’ mobility patterns. Then we design a new sybil detection model by incorporating
… Other sybil detection approaches exploit the unique behavior patterns, clickstream models …

SybilHunter: Hybrid graph-based sybil detection by aggregating user behaviors

J Mao, X Li, X Luo, Q Lin - Neurocomputing, 2022 - Elsevier
… Most existing graph-based sybil detection approaches only consider the static graph … , a
hybrid graph-based sybil detection approach by aggregating user social behavior patterns. Our …

Detecting the sybil attack in mobile ad hoc networks

C Piro, C Shields, BN Levine - 2006 Securecomm and …, 2006 - ieeexplore.ieee.org
… the threshold requirements detecting multi-radio Sybil attackers, … that wish to detect Sybil
The Sybil attack undermines these … otherwise capture behavior from all the Sybil identities of an …

Sybil attacks and their defenses in the internet of things

K Zhang, X Liang, R Lu, X Shen - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
… role in mobile networks. In [27], the mobile Sybil detection is exploited based on mobile user’…
normal user’s and Sybil attacker’s behaviors related to the mobility, channel conditions, the …

Detecting sybil attacks using proofs of work and location in vanets

M Baza, M Nabil, MMEA Mahmoud… - … on Dependable and …, 2020 - ieeexplore.ieee.org
… In this section, we present our Sybil detection scheme. We first start with an overview to our
scheme, followed by the system initialization. Then, we explain the exchanged messages for …

Lightweight sybil attack detection in manets

S Abbas, M Merabti, D Llewellyn-Jones… - IEEE systems …, 2012 - ieeexplore.ieee.org
… entry and exit behavior of legitimate nodes and Sybil nodes using … and Sybil identities based
on nodes’ entry and exit behavior. Third… (detecting a normal node as a Sybil node) in mobile

Crowdsourcing under attack: Detecting malicious behaviors in Waze

L Sanchez, E Rosas, N Hidalgo - Trust Management XII: 12th IFIP WG …, 2018 - Springer
… generate fake users and mobile devices using virtual machines … to the three malicious Sybil
behaviors previously exposed. Our … behaviors can be detected using a state-of-the-art Sybil