IMPROVED SECURITY MECHANISM FOR SOCIAL NETWORK SYBIL ATTACK |
Author(s): |
Suchita M. Bonde |
Keywords: |
Sybil attack, Sybil Defender, IP log. |
Abstract |
from last many years people were concerned about the security of social area network. In this social area network people create multiple bogus identities. To overcome this drawback, Sybil Defender mechanism is used along with the two ways security technique is use. Malicious users can create many identities but few trust relationships. Thus, there is a disproportionately small cut in the graph between the Sybil nodes and the honest nodes. Sybil Guard exploits this property to bound the number of identities a malicious user can create. The proposed system involves sybil identification technique along with the concept of the two way security mechanism. This two way security mechanism divide the password in two server and according to fake clustering, IP differentiation, IP log technique is used to identify where the user is sybil or genuine user. Due to this we can easily identify the sybil user. We show the effectiveness of Sybil Guard both analytically and experimentally. |
Other Details |
Paper ID: IJSARTV Published in: Volume : 3, Issue : 10 Publication Date: 10/1/2017 |
Article Preview |
Download Article |