Open Access   Article Go Back

Efficient and Enhancement Prediction of Sybil Attacks in Online Social Networks Using Vote-Trust Method

K.Dhivya 1 , S.Dhanalakshmi 2

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-4 , Page no. 367-671, Apr-2016

Online published on Apr 27, 2016

Copyright © K.Dhivya, S.Dhanalakshmi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K.Dhivya, S.Dhanalakshmi, “Efficient and Enhancement Prediction of Sybil Attacks in Online Social Networks Using Vote-Trust Method,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.367-671, 2016.

MLA Style Citation: K.Dhivya, S.Dhanalakshmi "Efficient and Enhancement Prediction of Sybil Attacks in Online Social Networks Using Vote-Trust Method." International Journal of Computer Sciences and Engineering 4.4 (2016): 367-671.

APA Style Citation: K.Dhivya, S.Dhanalakshmi, (2016). Efficient and Enhancement Prediction of Sybil Attacks in Online Social Networks Using Vote-Trust Method. International Journal of Computer Sciences and Engineering, 4(4), 367-671.

BibTex Style Citation:
@article{_2016,
author = {K.Dhivya, S.Dhanalakshmi},
title = {Efficient and Enhancement Prediction of Sybil Attacks in Online Social Networks Using Vote-Trust Method},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2016},
volume = {4},
Issue = {4},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {367-671},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=951},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=951
TI - Efficient and Enhancement Prediction of Sybil Attacks in Online Social Networks Using Vote-Trust Method
T2 - International Journal of Computer Sciences and Engineering
AU - K.Dhivya, S.Dhanalakshmi
PY - 2016
DA - 2016/04/27
PB - IJCSE, Indore, INDIA
SP - 367-671
IS - 4
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1464 1280 downloads 1469 downloads
  
  
           

Abstract

A remote sensor framework comprises of numerous sensor hubs which are deployed to monitor physical or environmental conditions Also, to pass the collected information to a base station. Though remote sensor framework is subjected to have major applications in all the areas, it too has numerous security dangers Also, attacks. Among all dangers such as sinkhole, wormhole, selective forwarding, denial of service also, hub replication, Sybil assault is a major assault where a single hub has different identities. When a Sybil hub act as a sender, it can send false information to its neighbors. When it acts as receiver, it can receive the information which is originally destined for a legitimate node. The existing arrangements consume more energy. So a vitality effective calculation named Sybil secure is proposed. Experimental results appear that Sybil secure devours less vitality than existing protection mechanisms.

Key-Words / Index Term

Remote Sensor Network, Sybil, Group Head, Inquiry Packet

References

[1] Srdjan Krco; Mattias Johansson; Vlasios Tsiatsis; Ivica Cubic; Katarina Matusikova; Roch Glitho, “Mobile Network Supported Wireless Sensor Network Services” 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, Year: 2007, Pages: 1 – 3.
[2] Xuyuan Zhang,2009 5th International, “Model Design of Wireless Sensor Network Based on Scale-Free Network Theory” Conference on Wireless Communications, Networking and Mobile Computing, Year: 2009, Pages: 1 – 4.
[3] Xuhui Chen; Peiqiang Yu, “Research on hierarchical mobile wireless sensor network architecture with mobile sensor nodes”, 2010 3rd International Conference on Biomedical Engineering and Informatics, Year: 2010, Volume: 7, Pages: 2863 – 2867.
[4] Yong-Sik Choi; Young-Jun Jeon; Sang-Hyun Park, “A study on sensor nodes attestation protocol in a Wireless Sensor Network”, Advanced Communication Technology (ICACT), 2010 The 12th International Conference on, Year: 2010, Volume: 1, Pages: 574 – 579.
[5] Yang Wenguo; Guo Tiande, “Notice of Retraction The Non-uniform Property of Energy Consumption and its Solution to the Wireless Sensor Network”, Education Technology and Computer Science (ETCS), 2010 Second International Workshop on, Year: 2010, Volume: 2, Pages: 186 – 192.
[6] Ren Yueqing; Xu Lixin, “A study on topological characteristics of wireless sensor network based on complex network”, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), Year: 2010, Volume: 15, Pages: V15-486 - V15-489.
[7] Jing Jiang; Zifei Shan; Wenpeng Sha; Xiao Wang; Yafei Dai, “Detecting and Validating Sybil Groups in the Wild”, 2012 32nd International Conference on Distributed Computing Systems Workshops, Year: 2012, Pages: 127 – 132.
[8] Kuan Zhang; Xiaohui Liang; Rongxing Lu; Xuemin Shen, “Sybil Attacks and Their Defenses in the Internet of Things”, IEEE Internet of Things Journal, Year: 2014, Volume: 1, Issue: 5, Pages: 372 – 383.
[9] Neil Zhenqiang Gong; Mario Frank; Prateek Mittal, “SybilBelief: A Semi-Supervised Learning Approach for Structure-BasedSybil Detection”, IEEE Transactions on Information Forensics and Security, Year: 2014, Volume: 9, Issue: 6, Pages: 976 – 987.
[10] R. Renuga Devi; M. Hemalatha, “Sybil node identification algorithm using connectivity threshold for secured community mining in social network”, Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on, Year: 2013, Pages: 1 – 4.
[11] Avita Katal; Mohammad Wazid; Roshan Singh Sachan; D. P. Singh; R. H. Goudar, “Effective Clustering Technique for Selecting Cluster Heads and SuperCluster Head in MANET” Machine Intelligence and Research Advancement (ICMIRA), 2013 International Conference on, Year: 2013,Pages: 1 – 6.
[12] Qiao Xuegong; Chen yan, “A control algorithm based on double cluster-head for heterogeneous wireless sensor network”, Industrial and Information Systems (IIS), 2010 2nd International Conference on. Year: 2010, Volume: 1, Pages: 541 – 544.
[13] Levente Buttyan; Tamas Holczer, “Private cluster head election in wireless sensor networks”, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, Year: 2009, Pages: 1048 – 1053.
[14] Jin-Su Kim; Seong-Yong Choi; Seung-Jin Han; Jun-Hyeog Choi; Jung-Hyun Lee;Kee-Wook Rim, “Alternative Cluster Head Selection Protocol for Energy Efficiency in Wireless Sensor Networks”, Future Dependable Distributed Systems, 2009 Software Technologies for, Year: 2009, Pages: 159 – 163.
[15] Xia Haiyan; Xia Haiying, “A Modified Cluster Head Selection Algorithm Based on Random Waiting”, Networking, Sensing and Control, 2008. ICNSC 2008. IEEE International Conference on, Year: 2008, Pages: 129 – 132.
[16] Yuto Takeda; Yasuo Musashi; Kenichi Sugitani; Toshiyuki Moriyama” DNS ANY Request Cannon Activity in DNS Query Packet Traffic”, 2013 6th International Conference on Intelligent Networks and Intelligent Systems (ICINIS), Year: 2013, Pages: 181 – 184.
[17] Yasuo Musashi; Florent Hequet; Dennis Arturo Ludeña Romaña; Shinichiro Kubota; Kenichi Sugitani” Detection of host search activity in PTR resource record based DNS querypacket traffic”, Information and Automation (ICIA), 2010 IEEE International Conference on, Year: 2010, Pages: 1284 – 1288.
[18] Chih-Chin Liu; A. L. P. Chen, “Parallel query processing in distributed object database systems by querypackets”, Research Issues in Data Engineering, 1995: Distributed Object Management, Proceedings. RIDE-DOM '95. Fifth International Workshop on, Year: 1995, Pages: 26 – 31.
[19] Shailendra Kumar Pathak; Raksha Upadhyay; Uma Rathore Bhatt, “An efficient query packets forward algorithm in ZRP protocol”, Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on, Year: 2014, Pages: 592 – 595.
[20] Nobuhiro Shibata; Yasuo Musashi; Dennis Arturo Ludena Romana; Shinichiro Kubota; Kenichi Sugitani, “Trends in Host Search Attack in DNS Query Request Packet Traffic”, Intelligent Networks and Intelligent Systems (ICINIS), 2012 Fifth International Conference on, Year: 2012, Pages: 126 – 129.