Sybil attacks and their defenses in the internet of things

K Zhang, X Liang, R Lu, X Shen - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …

Sybilbelief: A semi-supervised learning approach for structure-based sybil detection

NZ Gong, M Frank, P Mittal - IEEE transactions on information …, 2014 - ieeexplore.ieee.org
Sybil attacks are a fundamental threat to the security of distributed systems. Recently, there
has been a growing interest in leveraging social networks to mitigate Sybil attacks. However …

Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic

G Liu, Q Yang, H Wang, X Lin… - IEEE INFOCOM 2014 …, 2014 - ieeexplore.ieee.org
Assessing multi-hop interpersonal trust in online social networks (OSNs) is critical for many
social network applications such as online marketing but challenging due to the difficulties of …

Neighbor similarity trust against sybil attack in P2P e-commerce

G Wang, F Musau, S Guo… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Peer to peer (P2P) e-commerce applications exist at the edge of the Internet with
vulnerabilities to passive and active attacks. These attacks have pushed away potential …

Near-pri: Private, proximity based location sharing

E Novak, Q Li - IEEE INFOCOM 2014-IEEE Conference on …, 2014 - ieeexplore.ieee.org
As the ubiquity of smartphones increases we see an increase in the popularity of location
based services. Specifically, online social networks provide services such as alerting the …

Preserving secondary users' privacy in cognitive radio networks

Z Qin, S Yi, Q Li, D Zamkov - IEEE INFOCOM 2014-IEEE …, 2014 - ieeexplore.ieee.org
Cognitive radio plays an important role in improving spectrum utilization in wireless services.
In the cognitive radio paradigm, secondary users (SUs) are allowed to utilize licensed …

Communities, random walks, and social sybil defense

L Alvisi, A Clement, A Epasto, S Lattanzi… - Internet …, 2014 - Taylor & Francis
Sybil attacks, in which an adversary forges a potentially unbounded number of identities, are
a danger to distributed systems and online social networks. The goal of sybil defense is to …

Robust sybil attack defense with information level in online recommender systems

G Noh, Y Kang, H Oh, C Kim - Expert Systems with Applications, 2014 - Elsevier
As the major function of Recommender Systems (RSs) is recommending commercial items
to potential consumers (ie, system users), providing correct information of RS is crucial to …

Sybil-aware least cost rumor blocking in social networks

Y Ping, Z Cao, H Zhu - 2014 IEEE Global Communications …, 2014 - ieeexplore.ieee.org
Rumor blocking and Sybil Attack are regarded as two main security threats in online social
networks. The existing work on rumor blocking mainly considers how to minimize the …

LBSNSim: Analyzing and modeling location-based social networks

W Wei, X Zhu, Q Li - IEEE INFOCOM 2014-IEEE Conference on …, 2014 - ieeexplore.ieee.org
The soaring adoption of location-based social networks (LBSNs) makes it possible to
analyze human socio-spatial behaviors based on large-scale realistic data, which is …