Sybil Attacks and Their Defenses in the Internet of Things
暂无分享,去创建一个
Xiaohui Liang | Xuemin Shen | Rongxing Lu | Kuan Zhang | Xuemin Shen | R. Lu | Xiaohui Liang | Kuan Zhang
[1] Ming Li,et al. Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.
[2] Alice Cheng,et al. Sybilproof reputation mechanisms , 2005, P2PECON '05.
[3] Prateek Mittal,et al. SybilControl: practical sybil defense with computational puzzles , 2012, STC '12.
[4] Ernesto Damiani,et al. Managing and Sharing Servents' Reputations in P2P Systems , 2003, IEEE Trans. Knowl. Data Eng..
[5] Klaus Moessner,et al. Enabling smart cities through a cognitive management framework for the internet of things , 2013, IEEE Communications Magazine.
[6] Aziz Mohaisen,et al. Keep your friends close: Incorporating trust into social network-based Sybil defenses , 2011, 2011 Proceedings IEEE INFOCOM.
[7] Xiaodong Lin. LSR: Mitigating Zero-Day Sybil Vulnerability in Privacy-Preserving Vehicular Peer-to-Peer Networks , 2013, IEEE Journal on Selected Areas in Communications.
[8] Wu He,et al. Developing Vehicular Data Cloud Services in the IoT Environment , 2014, IEEE Transactions on Industrial Informatics.
[9] Gang Wang,et al. Social Turing Tests: Crowdsourcing Sybil Detection , 2012, NDSS.
[10] Shu Chen,et al. A Wearable Device for Real-Time Motion Error Detection and Vibrotactile Instructional Cuing , 2011, IEEE Transactions on Neural Systems and Rehabilitation Engineering.
[11] Philip W. L. Fong. Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems , 2011, 2011 IEEE Symposium on Security and Privacy.
[12] Brian Neil Levine,et al. Detecting the Sybil Attack in Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.
[13] Tarik Taleb,et al. M2M-based metropolitan platform for IMS-enabled road traffic management in IoT , 2011, IEEE Communications Magazine.
[14] Angelika Mueller,et al. Principles Of Random Walk , 2016 .
[15] Xiaohui Liang,et al. Security and privacy in mobile social networks: challenges and solutions , 2014, IEEE Wireless Communications.
[16] Lakshminarayanan Subramanian,et al. Optimal Sybil-resilient node admission control , 2011, 2011 Proceedings IEEE INFOCOM.
[17] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[18] Fengyuan Xu,et al. SybilDefender: Defend against sybil attacks in large social networks , 2012, 2012 Proceedings IEEE INFOCOM.
[19] Yu Meng,et al. A Novel Deployment Scheme for Green Internet of Things , 2014, IEEE Internet of Things Journal.
[20] Michael Sirivianos,et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.
[21] Haifeng Yu,et al. Sybil defenses via social networks: a tutorial and survey , 2011, SIGA.
[22] Aravind Srinivasan,et al. Efficient lookup on unstructured topologies , 2005, IEEE Journal on Selected Areas in Communications.
[23] Marco Gruteser,et al. ParkNet: drive-by sensing of road-side parking statistics , 2010, MobiSys '10.
[24] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.
[25] Jürgen Schönwälder,et al. Management of resource constrained devices in the internet of things , 2012, IEEE Communications Magazine.
[26] Y. Ahmet Sekercioglu,et al. A Survey on Distributed Topology Control Techniques for Extending the Lifetime of Battery Powered Wireless Sensor Networks , 2013, IEEE Communications Surveys & Tutorials.
[27] Xiao Wang,et al. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils , 2016, IEEE Transactions on Dependable and Secure Computing.
[28] Peter J. Denning,et al. Fault Tolerant Operating Systems , 1976, CSUR.
[29] Hannes Hartenstein,et al. Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[30] Hai Zhao,et al. VSLP: Voronoi-socialspot-aided packet forwarding protocol with receiver Location Privacy in MSNs , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[31] Emin Gün Sirer,et al. Experience with an Object Reputation System for Peer-to-Peer Filesharing , 2006, NSDI.
[32] Jin Li,et al. SOS: A Distributed Mobile Q&A SystemBased on Social Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[33] Jie Wu,et al. Sybil defenses in mobile social networks , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[34] Marimuthu Palaniswami,et al. An Information Framework for Creating a Smart City Through Internet of Things , 2014, IEEE Internet of Things Journal.
[35] Sherali Zeadally,et al. Intelligent Device-to-Device Communication in the Internet of Things , 2016, IEEE Systems Journal.
[36] Xiaohui Liang,et al. CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service , 2014, IEEE Internet of Things Journal.
[37] Xiaohui Liang,et al. Exploiting multimedia services in mobile social networks from security and privacy perspectives , 2014, IEEE Communications Magazine.
[38] Nazareno Andrade,et al. SybilRes: A Sybil-resilient Flow-Based Decentralized Reputation Mechanism , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.
[39] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[40] Dong Xuan,et al. E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[41] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[42] Bo Yu,et al. Detecting Sybil attacks in VANETs , 2013, J. Parallel Distributed Comput..
[43] Xiaohui Liang,et al. Enabling Trustworthy Service Evaluation in Service-oriented Mobile Social Networks , 2022 .
[44] Xiaohui Liang,et al. PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs , 2014, Inf. Sci..
[45] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.
[46] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[47] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[48] Damla Turgut,et al. Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support , 2013, Secur. Commun. Networks.
[49] Xiaohui Liang,et al. PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid , 2013, IEEE Transactions on Emerging Topics in Computing.
[50] Xiaohui Liang,et al. Enabling pervasive healthcare through continuous remote health monitoring , 2012, IEEE Wireless Communications.
[51] Xuemin Shen,et al. PARK: A privacy-preserving aggregation scheme with adaptive key management for smart grid , 2013, 2013 IEEE/CIC International Conference on Communications in China (ICCC).
[52] Arkady B. Zaslavsky,et al. Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[53] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..
[54] Xiaohui Liang,et al. Fully Anonymous Profile Matching in Mobile Social Networks , 2013, IEEE Journal on Selected Areas in Communications.
[55] Taher H. Haveliwala. Topic-Sensitive PageRank: A Context-Sensitive Ranking Algorithm for Web Search , 2003, IEEE Trans. Knowl. Data Eng..
[56] Silvio Lattanzi,et al. SoK: The Evolution of Sybil Defense via Social Networks , 2013, 2013 IEEE Symposium on Security and Privacy.
[57] Jon M. Kleinberg,et al. The small-world phenomenon: an algorithmic perspective , 2000, STOC '00.
[58] Bill Triggs,et al. Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[59] Madjid Merabti,et al. Lightweight Sybil Attack Detection in MANETs , 2013, IEEE Systems Journal.
[60] Peng Ning,et al. Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[61] Ben Y. Zhao,et al. Uncovering social network sybils in the wild , 2011, IMC '11.
[62] Krishna P. Gummadi,et al. Canal: scaling social network-based Sybil tolerance schemes , 2012, EuroSys '12.
[63] Gang Wang,et al. Northeastern University , 2021, IEEE Pulse.
[64] Peng Ning,et al. P2DAP — Sybil Attacks Detection in Vehicular Ad Hoc Networks , 2011, IEEE Journal on Selected Areas in Communications.
[65] Christos Faloutsos,et al. Graphs over time: densification laws, shrinking diameters and possible explanations , 2005, KDD '05.
[66] Félix J. García Clemente,et al. SeCoMan: A Semantic-Aware Policy Framework for Developing Privacy-Preserving and Context-Aware Smart Applications , 2016, IEEE Systems Journal.
[67] Philippe Flajolet,et al. Birthday Paradox, Coupon Collectors, Caching Algorithms and Self-Organizing Search , 1992, Discret. Appl. Math..
[68] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[69] Xiaohui Liang,et al. SAFE: A social based updatable filtering protocol with privacy-preserving in mobile social networks , 2013, 2013 IEEE International Conference on Communications (ICC).
[70] Fan Chung Graham,et al. Local Graph Partitioning using PageRank Vectors , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[71] Feng Xiao,et al. DSybil: Optimal Sybil-Resistance for Recommendation Systems , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[72] Lakshminarayanan Subramanian,et al. Sybil-Resilient Online Content Voting , 2009, NSDI.
[73] Bertrand Ducourthial,et al. On the Sybil attack detection in VANET , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[74] Jiming Chen,et al. Smart community: an internet of things application , 2011, IEEE Communications Magazine.
[75] Xiaodong Wang,et al. Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks , 2008, 2008 International Conference on Computational Intelligence and Security.
[76] Sriram Chellappan,et al. Leveraging platoon dispersion for Sybil detection in vehicular networks , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.
[77] Mao Yang,et al. An Empirical Study of Free-Riding Behavior in the Maze P2P File-Sharing System , 2005, IPTPS.
[78] Ben Y. Zhao,et al. Understanding latent interactions in online social networks , 2010, IMC '10.
[79] Qing Yang,et al. Comparative Investigation on CSMA/CA-Based Opportunistic Random Access for Internet of Things , 2014, IEEE Internet of Things Journal.
[80] Wenjing Lou,et al. On Broadcast Authentication in Wireless Sensor Networks , 2006, IEEE Transactions on Wireless Communications.
[81] Larry J. Greenstein,et al. Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.
[82] Xiao Wang,et al. VoteTrust: Leveraging friend invitation graph to defend against social network Sybils , 2013, 2013 Proceedings IEEE INFOCOM.
[83] Michael Kaminsky,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.
[84] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[85] Fei Zhang,et al. QRS Detection Based on Multiscale Mathematical Morphology for Wearable ECG Devices in Body Area Networks , 2009, IEEE Transactions on Biomedical Circuits and Systems.
[86] Ben Y. Zhao,et al. An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[87] Yiwei Thomas Hou,et al. SybilShield: An agent-aided social network-based Sybil defense among multiple communities , 2013, 2013 Proceedings IEEE INFOCOM.
[88] Yunhao Liu,et al. Passive diagnosis for wireless sensor networks , 2010, TNET.
[89] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[90] Nikolaos G. Bourbakis,et al. A Survey on Wearable Sensor-Based Systems for Health Monitoring and Prognosis , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[91] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[92] Ramesh Govindan,et al. Liquidity in credit networks: a little trust goes a long way , 2011, EC '11.
[93] Yenumula B. Reddy,et al. A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks , 2009, 2009 Third International Conference on Sensor Technologies and Applications.
[94] Noureddine Boudriga,et al. A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networks , 2013, 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC).
[95] Peng Ning,et al. Defending against Sybil attacks in sensor networks , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[96] Hovav Shacham,et al. Group signatures with verifier-local revocation , 2004, CCS '04.
[97] Yunhao Liu,et al. Cardinality Estimation for Large-Scale RFID Systems , 2011, IEEE Trans. Parallel Distributed Syst..
[98] Chris Jermaine,et al. The Latent Community Model for Detecting Sybils in Social Networks , 2012, NDSS.
[99] Chih-Jen Lin,et al. A comparison of methods for multiclass support vector machines , 2002, IEEE Trans. Neural Networks.
[100] Daniele Quercia,et al. Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue , 2010, 2010 Proceedings IEEE INFOCOM.
[101] David Zhang,et al. Special issue on "New sensing and processing technologies for hand-based biometrics authentication" , 2014, Information Sciences.
[102] Xiaowei Yang,et al. SybilFence: Improving Social-Graph-Based Sybil Defenses with User Negative Feedback , 2013, ArXiv.