A Alharbi, M Zohdy, D Debnath… - … Journal of Computer …, 2018 - search.proquest.com
Sybil attacks present a unique threat in the context of Mobile Social Networks and the Internet of Things. Existing research activity in this field focuses on developing novel …
S Zakhary, A Benslimane - Journal of Network and Computer Applications, 2018 - Elsevier
In recent years, networked devices spread into different activities in our daily lives enabling many innovative applications. These applications were not only computationally-intelligent …
Opportunistic Networks are envisioned to complement infrastructure-based communication in overloaded cellular settings, in remote areas, or during and immediately after large scale …
P Kaur, S Mittal - 2016 Ninth International Conference on …, 2016 - ieeexplore.ieee.org
Mobile opportunistic networks allow nodes to freely join and leave the network; hence they are highly susceptible to security threats. The paper proposes a method for detection and …
As redes DTN são redes móveis sem fio caracterizadas por um grande atraso entre as transmissões de mensagens e também por uma grande mobilidade entre os nós, o que …
OV Waziri, BB Jimoh, M Olalere, SIM Abdulhamid… - 2017 - repository.futminna.edu.ng
A particularly detrimental attack ravaging campus and ad hoc networks is the Sybil attack, where a node illegally claims more than one identity, targeting honest and genuine nodes …