… of user’s mobile social behaviors, ie, pseudonym changing … mobileSybildetection scheme to detectmobileSybil attackers according to their abnormal pseudonym changing behaviors. …
A Chinchore, F Jiang, G Xu - … , KMO 2015, Maribor, Slovenia, August 24-28 …, 2015 - Springer
… In this research, the behavior survey of these nodes is carried out and further analysed with the help of graph-based Sybildetection system. This paper particularly studies Sybil attacks …
X Zhang, H Zheng, X Li, S Du… - 2014 IEEE Global …, 2014 - ieeexplore.ieee.org
… capture users’ mobility patterns. Then we design a new sybildetection model by incorporating … Other sybildetection approaches exploit the unique behavior patterns, clickstream models …
J Mao, X Li, X Luo, Q Lin - Neurocomputing, 2022 - Elsevier
… Most existing graph-based sybildetection approaches only consider the static graph … , a hybrid graph-based sybildetection approach by aggregating user social behavior patterns. Our …
C Piro, C Shields, BN Levine - 2006 Securecomm and …, 2006 - ieeexplore.ieee.org
… the threshold requirements detecting multi-radio Sybil attackers, … that wish to detectSybil The Sybil attack undermines these … otherwise capture behavior from all the Sybil identities of an …
… role in mobile networks. In [27], the mobileSybildetection is exploited based on mobile user’… normal user’s and Sybil attacker’s behaviors related to the mobility, channel conditions, the …
… In this section, we present our Sybildetection scheme. We first start with an overview to our scheme, followed by the system initialization. Then, we explain the exchanged messages for …
S Abbas, M Merabti, D Llewellyn-Jones… - IEEE systems …, 2012 - ieeexplore.ieee.org
… entry and exit behavior of legitimate nodes and Sybil nodes using … and Sybil identities based on nodes’ entry and exit behavior. Third… (detecting a normal node as a Sybil node) in mobile …
L Sanchez, E Rosas, N Hidalgo - Trust Management XII: 12th IFIP WG …, 2018 - Springer
… generate fake users and mobile devices using virtual machines … to the three malicious Sybil behaviors previously exposed. Our … behaviors can be detected using a state-of-the-art Sybil …