Security attacks in opportunistic mobile networks: A systematic literature review

A Altaweel, S Aslam, I Kamel - Journal of Network and Computer …, 2023 - Elsevier
Abstract Opportunistic Mobile Networks (OMNs), also known as Delay Tolerant Networks
(DTNs), refer to wireless networks in which the mobile nodes (eg, smartphones, tablets …

Sybil attacks and defenses in internet of things and mobile social networks

A Alharbi, M Zohdy, D Debnath… - … Journal of Computer …, 2018 - search.proquest.com
Sybil attacks present a unique threat in the context of Mobile Social Networks and the
Internet of Things. Existing research activity in this field focuses on developing novel …

On location-privacy in opportunistic mobile networks, a survey

S Zakhary, A Benslimane - Journal of Network and Computer Applications, 2018 - Elsevier
In recent years, networked devices spread into different activities in our daily lives enabling
many innovative applications. These applications were not only computationally-intelligent …

Stalk and lie—The cost of Sybil attacks in opportunistic networks

S Trifunovic, A Hossmann-Picu - Computer Communications, 2016 - Elsevier
Opportunistic Networks are envisioned to complement infrastructure-based communication
in overloaded cellular settings, in remote areas, or during and immediately after large scale …

Unmasking non-simultaneous sybils in mobile opportunistic networks

P Kaur, S Mittal - 2016 Ninth International Conference on …, 2016 - ieeexplore.ieee.org
Mobile opportunistic networks allow nodes to freely join and leave the network; hence they
are highly susceptible to security threats. The paper proposes a method for detection and …

[PDF][PDF] UM MECANISMO PARA O INCENTIVO BASEADO EM CRÉDITOS PARA REDES TOLERANTES A ATRASOS E DISRUPÇÕES

DMC Christiani, CAV Campos - repositorio-bc.unirio.br
As redes DTN são redes móveis sem fio caracterizadas por um grande atraso entre as
transmissões de mensagens e também por uma grande mobilidade entre os nós, o que …

Mitigation of Sybil Attack on A Campus Network (Canet) Using Inter-Arrival Time Threshold and Physical Address Comparison

OV Waziri, BB Jimoh, M Olalere, SIM Abdulhamid… - 2017 - repository.futminna.edu.ng
A particularly detrimental attack ravaging campus and ad hoc networks is the Sybil attack,
where a node illegally claims more than one identity, targeting honest and genuine nodes …