IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Promoting Cooperation Among Strangers to Access Internet Services from an Ad Hoc Network
PERCOM '04 Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04)
MoB: a mobile bazaar for wide-area wireless services
Proceedings of the 11th annual international conference on Mobile computing and networking
Reality mining: sensing complex social systems
Personal and Ubiquitous Computing
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Impact of Human Mobility on Opportunistic Forwarding Algorithms
IEEE Transactions on Mobile Computing
Bubble rap: social-based forwarding in delay tolerant networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
MobiRate: making mobile raters stick to their word
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Media sharing based on colocation prediction in urban transport
Proceedings of the 14th ACM international conference on Mobile computing and networking
Lightweight Distributed Trust Propagation
ICDM '07 Proceedings of the 2007 Seventh IEEE International Conference on Data Mining
LoKey: leveraging the SMS network in decentralized, end-to-end trust establishment
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
An analysis of social network-based Sybil defenses
Proceedings of the ACM SIGCOMM 2010 conference
Measuring the mixing time of social graphs
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Canal: scaling social network-based Sybil tolerance schemes
Proceedings of the 7th ACM european conference on Computer Systems
Leveraging trust and distrust for sybil-tolerant voting in online social media
Proceedings of the 1st Workshop on Privacy and Security in Online Social Media
AMORES: an architecture for mobiquitous resilient systems
Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous Resilience
Aiding the detection of fake accounts in large scale social online services
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Defending against large-scale crawls in online social networks
Proceedings of the 8th international conference on Emerging networking experiments and technologies
Iolaus: securing online content rating systems
Proceedings of the 22nd international conference on World Wide Web
Preventing spam in opportunistic networks
Computer Communications
Hi-index | 0.00 |
Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely been designed for peer-to-peer networks but not for mobile networks. That is why we propose a new decentralized defence for portable devices and call it MobID. The idea is that a device manages two small networks in which it stores information about the devices it meets: its network of friends contains honest devices, and its network of foes contains suspicious devices. By reasoning on these two networks, the device is then able to determine whether an unknown individual is carrying out a sybil attack or not. We evaluate the extent to which MobID reduces the number of interactions with sybil attackers and consequently enables collaborative applications.We do so using real mobility and social network data. We also assess computational and communication costs of MobID on mobile phones.