Defending Sybil Attacks in Mobile Social Networks

被引:0
|
作者
Sun, Yan [1 ,2 ]
Yin, Lihua [1 ,3 ]
Liu, Wenmao [4 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
[3] Beijing Key Lab IOT Informat Secur, Beijing, Peoples R China
[4] Harbin Inst Technol, Res Ctr Comp Network & Informat Secur Technol, Beijing, Peoples R China
关键词
Sybil Attacks; Mobile Social Networks; Routing Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile social networks (MSNs) are a kind of delay tolerant network that consists of lots of mobile nodes with social characteristics. Recently, many social-aware algorithms have been proposed to address routing problems in MSNs. However, it also brings more security and privacy concerns. In this paper, we discuss a specific type of Sybil attack in MSNs, which few researches has been focused on. We proposed a security mechanism to detect Sybil nodes and eliminate them to ensure the routing security while routing forwarding. It needs to cooperate by two sides, which is, respectively measuring distance in client side and eliminating Sybil nodes in server side. We also demonstrate the solution is correct and analyze its energy costs.
引用
收藏
页码:163 / +
页数:2
相关论文
共 50 条
  • [21] A distributed method based on mobile agent to detect Sybil attacks in wireless sensor networks
    Moradi, Sepide
    Alavi, Meysam
    2016 EIGHTH INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2016, : 276 - 280
  • [22] Towards Efficient Detection of Sybil Attacks in Location-based Social Networks
    Xu, Zhiwei
    Chen, Bo
    Meng, Xuying
    Liu, Limin
    2017 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2017, : 741 - 747
  • [23] Cod ng Observer Nodes for Sybil Attacks Detection in Mobile Wireless Sensor Networks
    Sassani , Bahman A.
    Alomirah, Abdulaziz
    Pang, Shaning
    Sarrafpour, Soshian
    2021 IEEE 19TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2021), 2021, : 87 - 94
  • [24] Identification of Sybil attacks on social networks using a framework based on user interactions
    Asadian, Hooman
    Javadi, Hamid Haj Seyed
    SECURITY AND PRIVACY, 2018, 1 (02):
  • [25] Evaluating Sybil Attacks in P2P Infrastructures for Online Social Networks
    de Asis Lopez-Fuentes, Francisco
    Balleza-Gallegos, Salvador
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1262 - 1267
  • [26] A Sybil Attack Detection Scheme for Privacy-Preserving Mobile Social Networks
    Li, Pengfei
    Lu, Rongxing
    2015 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2015,
  • [27] Defending Battery Exhaustion Attacks on Mobile Systems
    Shin, Sungyong
    Lee, Taek
    In, Hoh Peter
    2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 1020 - 1025
  • [28] Intelligent Sybil attack detection on abnormal connectivity behavior in mobile social networks
    Chinchore, Anand
    Jiang, Frank
    Xu, Guandong
    Lecture Notes in Business Information Processing, 2015, 224 : 602 - 617
  • [29] Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services
    Wang, Gang
    Wang, Bolun
    Wang, Tianyi
    Nika, Ana
    Zheng, Haitao
    Zhao, Ben Y.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (03) : 1123 - 1136
  • [30] A Trust Structure for Detection of Sybil Attacks in Opportunistic Networks
    Rashidibajgan, Samaneh
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 347 - 351