[1] |
DOUCEUR J R. The Sybil Attack [C]//Lecture Notes in Computer Science:2429.Heidelberg:Springer Verlag, 2002: 251-260.
|
[2] |
王永程, 孟艳红. 针对有向社交网络的Sybil检测方法[J]. 西安电子科技大学学报, 2016,43(2):199-204.
|
|
WANG Yongcheng, MENG Yanhong. SybilGrid:Sybil Detection Method Based on Directed Social Networks[J]. Journal of Xidian University, 2016,43(2):199-204.
|
[3] |
HU Y C, PERRIG A. A Survey of Secure Wireless Ad Hoc Routing[J]. IEEE Security and Privacy, 2004,2(3):28-39.
|
[4] |
AL-QURISHI M, ALRUBAIAN M, RAHMAN S MM, et al. A Prediction System of Sybil Attack in Social Network Using Deep-regression Model[J]. Future Generation Computer Systems, 2018,87:743-753.
|
[5] |
ANGAPPAN K.An Improve Performance, Discovery and Interruption of Sybil Attack in MANET[J]. Middle-East Journal of Scientific Research, 2015,23(7):1346-1352.
|
[6] |
ZHENG H, XUE M, LU H, et al. Smoke Screener or Straight Shooter:Detecting Elite Sybil Attacks in User-Review Social Networks[C/OL].[2020-07-26].https://arxiv.org/pdf/1709.06916.pdf.
|
[7] |
CAYIRCI E, GOVINDAN R, ZNATI T, et al. Wireless Sensor Networks[J]. Computer Networks, 2003,43(4):417-419.
|
[8] |
BUCHEGGER S, LE BOUDEC J Y.A Robust Reputation System for P2P and Mobile Adhoc Networks P2P and Mobile Ad-hoc Networks[C/OL].[2020-07-26].https://www.researchgate.net/publication/2943041.
|
[9] |
YANG Z, WILSON C, WANG X, et al. Uncovering Social Network Sybils in the Wild[J]. ACM Transactions on Knowledge Discovery from Data, 2014,8(1):2556609.
|
[10] |
AYAIDA M, MESSAI N, NAJEH S, et al. A Macroscopic Traffic Model-based Approach for Sybil Attack Detection in VANETs[J]. Ad Hoc Networks, 2019,90:101845.
|
[11] |
ZHANG S, LEE J H. Double-spending with a Sybil Attack in the Bitcoin Decentralized Network[J]. IEEE Transactions on Industrial Informatics, 2019,15(10):5715-5722.
|
[12] |
司海飞, 杨忠, 王珺. 无线传感器网络研究现状与应用[J]. 机电工程, 2011,28(1):16-20,37.
|
|
SI Haifei, YANG Zhong, WANG Jun. Review on Research Status and Application of Wireless Sensor Networks[J]. Journal of Mechanical & Electrical Engineering, 2011,28(1):16-20,37.
|
[13] |
ALKHATIB A A A, BAICHER G S.Wireless Sensor Network Architecture[C/OL].[2020-07-26].https://www.researchgate.net/publication/227352986.
|
[14] |
BOUKERCHE A, LI X. An Agent-based Trust and Reputation Management Scheme for Wireless Sensor Networks [C]//Proceedings of the 2005 IEEE Global Telecommunications Conference.Piscataway:IEEE, 2005: 1857-1861.
|
[15] |
GANERIWAL S, BALZANO L K, SRIVASTAVA M B. Reputation-based Framework for High Integrity Sensor Networks[J]. ACM Transactions on Sensor Networks, 2008,4(3):15.
|
[16] |
PRAMOD A V, AZEEM M A, PRAKASH M O. Detecting the Sybil Attack in Wireless Sensor Network:Survey[J]. International Journal of Computers & Technology, 2004,3(1c):158-161.
|
[17] |
CHEN S, GENG Y, CHEN S. A Security Routing Mechanism Against Sybil Attack for Wireless Sensor Networks [C]//Proceedings of the 2010 WRI International Conference on Communications and Mobile Computing.Washington:IEEE Computer Society, 2010: 142-146.
|
[18] |
DHANALAKSHMI T G, BHARATHI N, MONISHA M. Safety Concerns of Sybil Attack in WSN [C]// Proceedings of the 2014 IEEE International Conference on Science Engineering and Management Research.Piscataway:IEEE, 2014: 7043659.
|
[19] |
NEWSOME J, SHI E, SONG D, et al. The Sybil Attack in Sensor Networks:Analysis & Defenses [C]// Proceedings of the 2004 Third International Symposium on Information Processing in Sensor Networks.New York:ACM, 2004: 259-268.
|
[20] |
RISHIWAL V, KUSH A, VERMA S. Stable and Energy Efficient Routing for Mobile Adhoc Networks [C]// Proceedings of the 2008 IEEE International Conference on Information Technology:New Generations.Piscataway:IEEE, 2008: 1028-1033.
|
[21] |
单宝颖, 魏东平. 移动自组织网络中的安全与信任技术研究[J]. 计算机与数字工程, 2020,48(8):1928-1934.
|
|
SHAN Baoying, WEI Dongping. Research on Security and Trust Technology in MANET[J]. Computer & Digital Engineering, 2020,48(8):1928-1934.
|
[22] |
SINHA S, PAUL A, PAL S. The Sybil Attack in Mobile Adhoc Network:Analysis and Detection [C]// Proceedings of the 2013 3rd IET International Conference on Computational Intelligence & Information Technology.London:IET, 2013: 458-466.
|
[23] |
JAMSHIDI M, ZANGENEH E, ESNAASHARI M, et al. A Novel Model of Sybil Attack in Cluster-based Wireless Sensor Networks and Propose A Distributed Algorithm to Defend It[J]. Wireless Personal Communications, 2019,105(1):145-173.
|
[24] |
YU H, KAMINSKY M, GIBBONS P B, et al. SybilGuard:Defending Against Sybil Attacks Via Social Networks[J]. IEEE/ACM Transactions on Networking, 2008,16(3):576-589.
|
[25] |
CAO Q, SIRIVIANOS M, YANG X, et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services [C]//Proceedings of the 2012 9th USENIX Symposium on Networked Systems Design and Implementation.Berkeley:USENIX Association, 2012: 197-210.
|
[26] |
VASUDEVA A, SOOD M. Survey on Sybil Attack Defense Mechanisms in Wireless Ad Hoc Networks[J]. Journal of Network and Computer Applications, 2018,120:78-118.
|
[27] |
KARLOF C, WAGNER D. Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures[J]. Ad Hoc Networks, 2003,1(2/3):293-315.
|
[28] |
GUPTA D, SAIA J, YOUNG M. Resource-Competitive Sybil Defenses[J/OL].[2020-07-26].https://arxiv.org/pdf/1911.06462v1.pdf.
|
[29] |
WU Z, MA R. A Novel Sybil Attack Detection Scheme Based on Edge Computing for Mobile IoT Environment[J/OL].[2020-07-26].https://arxiv.org/pdf/1911.03129.pdf.
|
[30] |
MARGOLIN N B, LEVINE B N. Quantifying Resistance to the Sybil Attack [C]//Lecture Notes in Computer Science:5143.Heidelberg:Springer Verlag, 2008: 1-15.
|
[31] |
ABBAS S, MERABTI M, LIEWELLYN-JONES D, et al. Lightweight Sybil Attack Detection in Manets[J]. IEEE Systems Journal, 2013,7(2):236-248.
|
[32] |
DEMIRBAS M, SONG Y. An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks [C]//Proceedings of the 2006 International Symposium on a World of Wireless,Mobile and Multimedia Networks.Washington:IEEE Computer Society, 2006: 564-568.
|
[33] |
XIAO B, YU B, GAO C. Detection and Localization of Sybil Nodes in VANETs [C]//Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks.New York:ACM, 2006: 1-8.
|
[34] |
TANGPONG A, KESIDIS G, HSU H Y, et al. Robust Sybil Detection for Manets [C]//Proceedings of the 2009 International Conference on Computer Communications and Networks.Piscataway:IEEE, 2009: 5235387.
|
[35] |
ZHANG X, XIE H, LUI J C S.Sybil Detection in Social-activity Networks:Modeling,Algorithms and Evaluations [C]//Proceedings of the 2018 International Conference on Network Protocols.Washington:IEEE Computer Society, 2018: 44-54.
|
[36] |
YUAN D, MIAO Y, GONG N Z, et al. Detecting Fake Accounts in Online Social Networks at the Time of Registrations [C]//Proceedings of the 2019 ACM Conference on Computer and Communications Security.New York:ACM, 2019: 1423-1438.
|
[37] |
BOSHMAF Y, LOGOTHETIS D, SIGANOS G, et al. Integro:Leveraging Victim Prediction for Robust Fake Account Detection in Large Scale OSNs[J]. Computers and Security, 2016,61:142-168.
|
[38] |
AMATO F, CASTIGLIONE A, DE SANTO A, et al. Recognizing Human Behaviours in Online Social Networks[J]. Computers and Security, 2018,74:355-370.
|
[39] |
AL-QURISHI M, HOSSAIN M S, ALRUBAIAN M, et al. Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-scale Social Networks[J]. IEEE Transactions on Industrial Informatics, 2018,14(2):799-813.
|
[40] |
WANG G, KONOLIGE T, WILSON C, et al. You Are How You Click:Clickstream Analysis for Sybil Detection [C]//Proceedings of the 2013 22nd USENIX Security Symposium.Berkeley:USENIX Association, 2013: 241-256.
|
[41] |
DE MONTJOYE Y A, HIDALGO C A, VERLEYSEN M, et al.Unique in the Crowd:the Privacy Bounds of Human Mobility[J/OL].[2020-07-26].https://www.nature.com/articles/srep01376.
|
[42] |
ZHANG X, ZHENG H, LI X, et al. You Are Where You Have Been:Sybil Detection Via Geo-location Analysis in OSNs [C]//Proceedings of the 2014 IEEE Global Communications Conference.Piscataway:IEEE, 2014: 698-703.
|
[43] |
DENG R, RUAN N, JIN R, et al. SpamTracer:Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features [C]//Lecture Notes in Computer Science:11449.Heidelberg:Springer Verlag, 2019: 384-403.
|
[44] |
GONG Q, CHEN Y, HE X, et al. DeepScan:Exploiting Deep Learning for Malicious Account Detection in Location-based Social Networks[J]. IEEE Communications Magazine, 2018,56(11):21-27.
|
[45] |
ZHANG X, XIE H, LUI J C S.Sybil Detection in Social-activity Networks:Modeling,Algorithms and Evaluations [C]//Proceedings of the 2018 International Conference on Network Protocols.Washington:IEEE Computer Society, 2018: 44-54.
|
[46] |
YU H, GIBBONS P B, KAMINSKY M, et al. Sybillimit:a Near-optimal Social Network Defense Against Sybil Attacks [C]//Proceedings of the 2008 IEEE Symposium on Security and Privacy.Piscataway:IEEE, 2008: 3-17.
|
[47] |
WANG B, ZHANG L, GONG N Z. SybilSCAR:Sybil Detection in Online Social Networks Via Local Rule Based Propagation [C]//Proceedings of the 2017 IEEE INFOCOM.Piscataway:IEEE, 2017: 8057066.
|
[48] |
IRANI D, BALDUZZI M, BALZAROTTI D, et al. Reverse Social Engineering Attacks in Online Social Networks [C]//Lecture Notes in Computer Science:6739.Heidelberg:Springer Verlag, 2011: 55-74.
|
[49] |
EFFENDY S, YAP R H C.The Strong Link Graph for Enhancing Sybil Defenses [C]//Proceedings of the 2017 International Conference on Distributed Computing Systems.Piscataway:IEEE, 2017: 944-954.
|
[50] |
JIA J, WANG B, GONG N Z. Random Walk Based Fake Account Detection in Online Social Networks [C]// Proceedings of the 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.Piscataway:IEEE, 2017: 273-284.
|
[51] |
GAO P, WANG B, GONG N Z, et al. Sybilfuse:Combining Local Attributes with Global Structure to Perform Robust Sybil Detection [C]//Proceedings of the 2018 IEEE Conference on Communications and Network Security.Piscataway:IEEE, 2018: 8433147.
|