In this paper, we propose a Social-based Mobile Sybil Detection (SMSD) scheme to detect Sybil attackers from their abnormal contacts and pseudonym changing behaviors. Specifically, we first define four levels of Sybil attackers in mobile environments according to their attacking capabilities. We then exploit mobile users\u27 contacts and their pseudonym changing behaviors to distinguish Sybil attackers from normal users. To alleviate the storage and computation burden of mobile users, the cloud server is introduced to store mobile user\u27s contact information and to perform the Sybil detection. Furthermore, we utilize a ring structure associated with mobile user\u27s contact signatures to resist the contact forgery by mobile users and clou...
[[abstract]]Participatory sensing is an innovative model in mobile sensing network which allows volu...
Sybil attacks are one of the well-known and powerful attacks against online social networks. Sybil u...
AbstractSybil attack is an attack in which the identities of the node are subverted and the large nu...
[[abstract]]Mobile crowd sensing (MCS) arises as a new sensing paradigm, which leverages citizens fo...
Mobile crowd sensing (MCS) arises as a new sensing paradigm, which leverages citizens for large-scal...
Abstract—The emerging Internet-of-Things (IoT) are vulnera-ble to Sybil attacks where attackers can ...
Abstract. With more than one trillion mobile messages delivered world-wide every year, SMS has been ...
A location-based social network (LBSN) can facilitate interactions between nearby strangers. However...
Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack ...
In both wireless and mobile ad hoc networks, assaults can come from a variety of different sources. ...
Sybil accounts are fake identities created to unfairly increase the power or resources of a single m...
Sybil accounts are fake identities created to unfairly increase the power or resources of a single m...
Sybil attacks present a unique threat in the context of Mobile Social Networks and the Internet of T...
[[abstract]]Participatory sensing is a revolutionary paradigm in which volunteers collect and share ...
Sybil accounts are fake identities created to unfairly increase the power or resources of a single m...
[[abstract]]Participatory sensing is an innovative model in mobile sensing network which allows volu...
Sybil attacks are one of the well-known and powerful attacks against online social networks. Sybil u...
AbstractSybil attack is an attack in which the identities of the node are subverted and the large nu...
[[abstract]]Mobile crowd sensing (MCS) arises as a new sensing paradigm, which leverages citizens fo...
Mobile crowd sensing (MCS) arises as a new sensing paradigm, which leverages citizens for large-scal...
Abstract—The emerging Internet-of-Things (IoT) are vulnera-ble to Sybil attacks where attackers can ...
Abstract. With more than one trillion mobile messages delivered world-wide every year, SMS has been ...
A location-based social network (LBSN) can facilitate interactions between nearby strangers. However...
Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack ...
In both wireless and mobile ad hoc networks, assaults can come from a variety of different sources. ...
Sybil accounts are fake identities created to unfairly increase the power or resources of a single m...
Sybil accounts are fake identities created to unfairly increase the power or resources of a single m...
Sybil attacks present a unique threat in the context of Mobile Social Networks and the Internet of T...
[[abstract]]Participatory sensing is a revolutionary paradigm in which volunteers collect and share ...
Sybil accounts are fake identities created to unfairly increase the power or resources of a single m...
[[abstract]]Participatory sensing is an innovative model in mobile sensing network which allows volu...
Sybil attacks are one of the well-known and powerful attacks against online social networks. Sybil u...
AbstractSybil attack is an attack in which the identities of the node are subverted and the large nu...