Sybil attacks and their defenses in the internet of things

K Zhang, X Liang, R Lu, X Shen - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …

Future IoT‐enabled threats and vulnerabilities: State of the art, challenges, and future prospects

A Srivastava, S Gupta, M Quamara… - International Journal …, 2020 - Wiley Online Library
In the recent era, the security issues affecting the future Internet‐of‐Things (IoT) standards
has fascinated noteworthy consideration from numerous research communities. In this view …

Foundations, properties, and security applications of puzzles: A survey

IM Ali, M Caprolu, RD Pietro - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Cryptographic algorithms have been used not only to create robust ciphertexts but also to
generate cryptograms that, contrary to the classic goal of cryptography, are meant to be …

Sybil defense techniques in online social networks: a survey

M Al-Qurishi, M Al-Rakhami, A Alamri… - IEEE …, 2017 - ieeexplore.ieee.org
The problem of malicious activities in online social networks, such as Sybil attacks and
malevolent use of fake identities, can severely affect the social activities in which users …

A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it

M Jamshidi, E Zangeneh, M Esnaashari… - Wireless Personal …, 2019 - Springer
Abstract Today, Wireless Sensor Networks are widely employed in various applications
including military, environment, medical and urban applications. Thus, security …

Identifying and characterizing Sybils in the Tor network

P Winter, R Ensafi, K Loesing, N Feamster - 25th USENIX Security …, 2016 - usenix.org
Being a volunteer-run, distributed anonymity network, Tor is vulnerable to Sybil attacks. Little
is known about real-world Sybils in the Tor network, and we lack practical tools and methods …

Proof of work without all the work

D Gupta, J Saia, M Young - … of the 19th international conference on …, 2018 - dl.acm.org
Proof-of-work (PoW) is an algorithmic tool used to secure networks by imposing a
computational cost on participating devices. Unfortunately, traditional PoW schemes require …

The sybil attacks and defenses: a survey

A Mohaisen, J Kim - arXiv preprint arXiv:1312.6349, 2013 - arxiv.org
In this paper we have a close look at the Sybil attack and advances in defending against it,
with particular emphasis on the recent work. We identify three major veins of literature work …

A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks

M Jamshidi, E Zangeneh, M Esnaashari… - Computers & Electrical …, 2017 - Elsevier
Sybil attack is a well-known attack against wireless sensor networks (WSNs) in which a
malicious node attempts to propagate multiple identities. This attack is able to affect routing …

The mason test: A defense against sybil attacks in wireless networks without trusted authorities

Y Liu, DR Bild, RP Dick, ZM Mao… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Wireless networks are vulnerable to Sybil attacks, in which a malicious node poses as many
identities in order to gain disproportionate influence. Many defenses based on spatial …