Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

72 results about "Sybil attack" patented technology

In a Sybil attack, the attacker subverts the reputation system of a peer-to-peer network by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. It is named after the subject of the book Sybil, a case study of a woman diagnosed with dissociative identity disorder. The name was suggested in or before 2002 by Brian Zill at Microsoft Research. The term pseudospoofing had previously been coined by L. Detweiler on the Cypherpunks mailing list and used in the literature on peer-to-peer systems for the same class of attacks prior to 2002, but this term did not gain as much influence as "Sybil attack".

Certificate-based vehicle identification method for use in internet of vehicles

The invention relates to a certificate-based vehicle identification method for use in an internet of vehicles. The method is characterized in that a vehicle is independently identified with a time-limited certificate which is issued by a region server and replacing the true identity of the vehicle; the vehicle detects a malicious vehicle identity and transmits it to the region server; after receiving the malicious vehicle identity and its signature, the region server traces region registration information of the true identity and transmits the region registration information to a certification center; the certification center confirms the true identity of the vehicle and revokes the identity. The method has the advantages that the problem that the failure of the vehicle to independently finish the identification process by the existing Sybil attack detection method causes attack detection delay is solved; extra space and computation overhead caused by revoking of the vehicle identity are avoided; independent vehicle identification and privacy protection are achieved; the true identity of each malicious vehicle can be traced so that re-attacks of the malicious vehicles are prevented.
Owner:JIANGSU UNIV

Auxiliary driving vehicle gateway for multi-CPU hard isolation of intelligent interconnection

The invention discloses an auxiliary driving vehicle gateway for multi-CPU hard isolation of intelligent interconnection. The auxiliary driving vehicle gateway comprises a vehicle security communication system and a vehicle information analysis and control system, wherein the vehicle security communication system comprises a vehicle gateway double-wireless network card structure composed of an inter-vehicle wireless communication module and a vehicle domain wireless communication module, and a vehicle owner mobile terminal, and the vehicle security communication system carries out CPU control by an I.MX6Q processor; and the vehicle information analysis and control system carries out CPU control by an Exynos4412 processor, and comprises a driving route identification module, a driving behavior analysis module, a vehicle information collection module and an intelligent vehicle controller. The auxiliary driving vehicle gateway disclosed by the invention can realize the communication security of the vehicle gateway, realize driving security by driver fatigue state analysis based on Opencv face recognition and driving route recognition and analysis, as well as effectively resisting against Sybil attack and other various types of attacks from a hardware level to prevent hackers from invading the vehicle gateway to obtain vehicle information and controlling the vehicle.
Owner:JIANGSU UNIV

Block synchronization method and system

The invention discloses a block synchronization method and a block synchronization system. A part of normal nodes in a block chain network become snapshoot nodes by the way of mortgaging digital currency, the snapshoot nodes perform snapshoot treatment on transaction information in a plurality of blocks in a snapshoot area, so that the snapshoot information of the blocks is acquired, and the snapshoot information is signed to acquire corresponding signature information; a newly added node acquires snapshoot information and corresponding signature information from the snapshoot nodes, verifiesthe signature information and the snapshoot information; if the verification is passed, and the quantity of the same snapshoot information is more than a certain number, the block is downloaded from the preset node, the snapshoot information passing the verification is used for verifying the downloaded block; if the verification is passed, the downloaded block is added into a block chain transcript of the node, so that the block synchronization security is enhanced, the problem that the false block is synchronized due to the inexistence of a credible node list used for generating the snapshootinformation is avoided, and the risk of suffering a Sybil attack is reduced.
Owner:JIANGSU PAYEGIS TECH CO LTD +1

Method for resisting Sybil attack with multiple fake identity sources in car networking

The invention discloses a method for resisting Sybil attack with multiple fake identity sources in car networking. The method comprises the following steps that an RSU establishes a local certificate for a registered vehicle in the car networking so as to resist the Sybil attack with the fake identity; the RSU resists the Sybil attack with the steal identity by verifying the local certificate of the vehicle in the vehicle-vehicle communication process; the vehicle establishes the real-time and dynamic reputation value and the credible value for each alarming event, and performs after-treatment. The method is used for resisting the Sybil attack with multiple fake identity sources, such as fake, steal and conspiring, and meanwhile protecting the privacy of the vehicle as well as resisting attack.
Owner:JIANGSU UNIV

Method for detecting Sybil attack

Directed towards solving the problem of the Sybil attack faced by wireless sensor network routing protocol, the invention provides a method for detecting Sybil attack. In a way of carrying along with detection parameter message at the end of a data packet at the protocol execution stage, the method makes a synthetic judgment about the Sybil attack in the wireless sensor network through node energy and received signal strength value, and raises the detection precision through the mutual supervision between cluster-head nodes and member nodes. The invention provides a practical and feasible method for detecting Sybil attack for network, in particular for sensor network, and can effectively raise the safety of wireless sensor network, such as the detection to routing, resource distribution and deviant behavior, etc. The scheme has the advantages of simple realization, high detection rate and strong anti-attack ability, etc.
Owner:NANJING UNIV OF POSTS & TELECOMM

Location privacy based ring signature method in Internet of vehicles

The invention relates to a location privacy based ring signature method in the Internet of vehicles, belongs to the field of vehicle identity authentication in the Internet of vehicles, and aims at solving the problem in detecting collusive Sybil attacks. Path information of a vehicle is used as identity information of the vehicle, the path information contains location privacy information of the vehicle, and location privacy information is protected in the ring signature method. Compared with a present Sybil attack detection method, the vehicle identity authentication method provided by the invention can make vehicles independent from each other, protect the location privacy of the vehicles, and detect the novel collusive Sybil attack existing in the Internet of vehicles in real time.
Owner:JIANGSU UNIV

Sybil node recognition method based on physical layer confidence degree

The invention discloses a Sybil node recognition method based on the physical layer confidence degree. The method includes the steps that a node i and a node j are subjected to upper-layer initial authentication; the node i calculates and records the physical channel information H0<j> and ID0 of an information package; the information package confidence degree St<k>( i, j) is calculated and stored in a confidence degree list; whether the node confidence degree Sk(i, j) of the node j reaches the confidence threshold eta or not, if not, it is judged that the node j is a Sybil node, the node j is abandoned, and the whole network is notified. The Sybil node recognition method aims to achieve the purposes that the problem of single point failure of a centralized detection scheme of Sybil attack of a wireless sensor network is solved, a witness node in a distributed detection scheme is not needed, the physical channel information serves as an identity index, the confidence degree is established, a system can have certain tolerance, Sybil node recognition complexity is lowered while the false alarm rate is also lowered, and thus precision of Sybil node recognition is improved.
Owner:UNIV OF ELECTRONIC SCI & TECH OF CHINA

Node collaboration based Sybil attack detection method

The invention discloses a node collaboration based Sybil attack detection method in a power controllable WSN (Wireless Sensor Network) and belongs to the network security technical field. The node collaboration based Sybil attack detection method comprises facing the real network environment which comprises the path loss and shadow fading and is a large scale propagation model to analyze a secondary difference value of an RSSI (Received Signal Strength Indicator) and providing a Sybil node identification algorithm according to the characteristic that the secondary difference value of the RSSI is not affected by changes of the node transmission power, wherein the Sybil node identification algorithm distinguishes whether two nodes are two Sybil identities which are forged through a malicious node or not through the mutual collaboration of public monitoring nodes of the two ordinary nodes. According to the node collaboration based Sybil attack detection method, the characteristics of the secondary difference value of the RSSI and the monitoring node cooperation scheme are combined and accordingly the detection efficiency of Sybil attacks in the power controllable WSN is improved and the network life cycle can be extended.
Owner:NANJING UNIV OF POSTS & TELECOMM

Real-time map updating system and method based on trust management, and Internet-of-vehicles terminal

The invention belongs to the technical field of real-time map updating, and discloses a real-time map updating system and method based on trust management and an Internet-of-vehicles terminal. A vehicle is registered in a law enforcement agency, and identity information is reserved in the law enforcement agency; the vehicle sends a request for updating the own public key to a law enforcement agency; road condition information is collected, and a vehicle accurately uploads surrounding road conditions to fog nodes to improve trust values; meanwhile, the fog node needs to carry out identity verification on the vehicle before receiving the message from the vehicle; the fog node verifies the road condition information uploaded by the vehicle by using a Bayesian inference model, and sends the road condition information to a real-time map updating server according to a verification result; the fog node generates a corresponding rating for each message source vehicle, so that the timeliness and the accuracy of map updating are realized; when the trust value of the vehicle is lower than the preset threshold value, the vehicle cannot continue to enjoy the service provided by real-time map updating, and Sybil attacks are avoided.
Owner:XIAN UNIV OF POSTS & TELECOMM

Internet-of-Vehicles intrusion detection system based on hidden Markov model

The invention belongs to the field of intrusion detection algorithms in the Internet of Vehicles, and particularly relates to an Internet-of-Vehicles intrusion detection system based on a hidden Markov model. The system is used for intrusion detection of a False alert attack, a Sybil attack, a Black hole attack and a DoS attack in the Internet of Vehicles. The system mainly comprises a pre-detection module, a DNN-based detection center module, an updating module used for recording a vehicle state and generating a hidden Markov model, and a response center module used for generating a responsesignal, and under the normal operation state of the Internet of Vehicles, the modules jointly guarantee efficient operation of the Internet of Vehicles. Under the attack detection state, the components supplement each other to jointly complete an attack monitoring defense process. Compared with the DNN-based IDS, the Internet-of-Vehicles intrusion detection system has the advantages that the detection precision, overhead and detection time are improved, the detection precision is higher, the average detection time is far shorter than that of an IDS based on DNN, meanwhile, the expenditure is lower, compared with an IDS using state switching, the expenditure of a pre-detection mechanism used in the method is lower, and more computing resources are saved.
Owner:NORTHEASTERN UNIV

Multichannel dynamic spectrum allocation method against sybil attack, computer program

The invention belongs to the technical field of dynamic resource partitioning, and discloses a dynamic spectrum allocation method for multi-channel protection against Sybil attack, and a computer program. In order to defend against Sybil attacks, a spectrum auction model is designed to dynamically manipulate the spectrum auction strategy according to the flexible and real valuation. The bidding relationship among the secondary users is discussed in the model, and the spectrum auction is carried out by designing a specific bidding strategy. Adopting auction theory and mechanism to prevent Sybilattack, spectrum auction is carried out online through bidding strategy. The frequency spectrum allocation method of the invention not only realizes individual rationality and authenticity, but alsocan resist Sybil attack, and dynamically allocates channels on line, thereby improving frequency spectrum efficiency and reusability. According to the evaluation result, the present invention can prevent bidders from manipulating the auction and achieve good spectrum reallocation performance. The method provided by the invention is easy to realize and easy to expand, and is closer to practical application than the spectrum auction method provided by the invention.
Owner:XIDIAN UNIV

Malicious node physical layer detection method and system based on automatic labeling and learning

InactiveCN110995721AImprove malicious node detection rateSolve the problem of malicious node detectionTransmissionCommunications securityAlgorithm
The invention relates to the technical field of communication safety, and discloses a malicious node physical layer detection method and detection system based on automatic labeling and learning. According to the detection method, the type of an access node in a network is identified based on a physical layer authentication strategy of channel difference, and malicious nodes initiating clone attacks and Sybil attacks can be detected at the same time; corresponding labels are automatically injected according to the types of the access nodes, so that the problem of manually injecting attack labels is solved, and the difficulty of lacking attack label samples when a supervised machine learning algorithm is used for channel authentication is solved; attack label samples are automatically injected by utilizing physical layer channel difference and setting a threshold method, and an offline label sample set is provided for a machine learning algorithm, so that automatic label injection and learning are realized, and the malicious node detection rate of an access node is improved. According to the method, the problem that the edge calculation node detects malicious nodes of various industrial wireless devices in an asymmetric scene of the industrial edge calculation Internet of Things can be effectively solved.
Owner:SHENZHEN POWER SUPPLY BUREAU +1

Low-altitude node identity authentication and privacy protection method based on Hash chain

The present invention discloses a low-altitude node identity authentication and privacy protection method based on a Hash chain. The method comprises the steps of: when a vehicle node enters a space-air-ground integral network at the first time, taking unique and undeniable wireless signal fingerprints which cannot be cloned as identity features of the vehicle node, and creating a Hash block for the vehicle node while performing identity registration of the vehicle node by an authentication center; when communication of the vehicle node is performed in an area, performing identity authentication based on block content by a management node; in order to protect the identity privacy, employing a pseudonym generated by the management node to perform communication by the vehicle node; and recording key motions or information of different nodes at different time in the area by the management node, and recording the key motions or the information of the vehicle node itself at different areasat different time by the vehicle node. The method can effectively defense various attacks such as the sybil attack, the denial of service attack and the replay attack. Besides, the data safety of thenetwork is guaranteed, namely, the confidentiality, integrity, availability and non-repudiation of the data in the network.
Owner:XIAMEN UNIV

Internet of Vehicles Sybil attack detection method, device and apparatus and storage medium

The invention relates to the technical field of Internet of Vehicles, and discloses an Internet of Vehicles Sybil attack detection method, device and apparatus and a storage medium, and the method comprises the steps: obtaining the state information of a target vehicle, building a physical feature model according to the state information, obtaining the movement track of the target vehicle, carrying out the similarity analysis according to the movement track of the target vehicle, obtaining similarity feature vectors according to a preset similarity detection model, inputting the similarity feature vectors into a movement behavior detection model obtained through training to obtain similarity feature vectors with close distances, and taking vehicles corresponding to the similarity feature vectors with close distances as malicious vehicles attacked by Sybil. The physical feature model completely records the driving track of the target vehicle, the similarity feature vectors with close distances are obtained through the moving behavior detection model, the detection accuracy is improved, malicious vehicles with Sybil attacks are detected, the technical problem that whether Sybil attacks exist in Internet of Vehicles applications or not cannot be detected in the prior art is solved, and the security of Internet of Vehicles is improved.
Owner:ANHUI JIANGHUAI AUTOMOBILE GRP CORP LTD

Detection method for Sybil attack of wireless network based on channel state characteristics

The invention discloses a detection method for a Sybil attack of a wireless network based on channel state characteristics. The method comprises the following steps of (1) collecting signal state characteristic information of each client by a central detection AP, eliminating a phase deviation and a time deviation in the channel state characteristics by utilizing a self-adaptive MUSIC algorithm, meanwhile, computing an angle of arrival of a sight distance route by applying a spatial smoothing MUSIC algorithm through a receiving phase, and distinguishing angle signals transmitted by different APs by comparing different RSSI values; (2) detecting the Sybil attack and a Sybil node through combination of the angle of arrival and the signal strength, and distinguishing whether the node is underthe Sybil attack or not through comparison with the actual sending angle of arrival (AoA) and the RSSI; and (3 ) constructing a Sybil attack detection model system, carrying out experiments on the APand mobile equipment at different angles, meanwhile, computing the angle and carrying out simulation experiment on the Sybil attack, and detecting the Sybil node and the Sybil attack. According to the method, the Sybil node and the Sybil attack in the wireless network can be accurately detected, and the detection efficiency is 98%.
Owner:TIANJIN UNIVERSITY OF TECHNOLOGY

Sybil attack node detection method and device considering sensor errors

The invention discloses a Sybil attack node detection method and device considering sensor errors, relates to the technical field of vehicle-mounted network security, and solves the technical problemthat the detection of a Sybil attack node by a vehicle-mounted network is not accurate enough. The main points of the technical scheme of the invention are that the method comprises the steps that aninformation acquisition device receives a CAM message broadcast by a neighbor node; a pre-detection device fuses sensor errors to judge the rationality of the vehicle node communication range; a preprocessing device performs filtering optimization processing on a node RSSI sequence with a reasonable communication range by using Gaussian filtering; a detection device uses a DTW algorithm to measurethe spatial difference and the time difference between a node RSSI sequence and a moving sequence so as to discover Sybil nodes in neighbor nodes. While malicious behaviors in the vehicle-mounted adhoc network are detected in real time, inherent physical acquisition errors of the sensor are considered, and the rationality of the detection process is improved; the calculation load of the DTW detection algorithm is greatly reduced, and the detection time is shortened.
Owner:SOUTHEAST UNIV

Sybil attack detection method based on node attention and forwarding characteristics and electronic equipment

The invention discloses a Sybil attack detection method and electronic equipment based on node attention and forwarding characteristics, and the detection method comprises the steps: obtaining social network user behavior data, and extracting a node feature vector and a node pair feature vector from the social network user behavior data based on the node attention and forwarding characteristics; inputting the node feature vector into a preset node classifier to obtain an initial trust value of the node, and inputting the node pair feature vector into a preset node pair classifier to obtain an initial trust value of the node pair; constructing a weighted strong social graph according to a preset social graph and the initial trust values of the node pairs; and carrying out trust propagation in the weighted strong social graph according to the initial trust values of the nodes by using a random walk algorithm to obtain a Sybil node set and a benign node set. According to the method, the user behavior information is integrated in the graph structure of the social network, so that the Sybil detection accuracy and practicability are effectively improved, and the method is simple and easy to implement.
Owner:BEIHANG UNIV

Method for digital key misbehavior and sybil attack detection through user profiling

The invention relates to a method for digital key misbehavior and sybil attack detection through user profiling, and concretely discloses a digital key sharing system. The digital key sharing system includes an electronic circuit and a first server computer. The electronic circuit is configured to store a plurality of digital keys, receive a plurality of key sharing requests, and generate a plurality of features in response to the plurality of key sharing requests. The first server computer is in wireless communication with the electronic circuit and is configured to generate an alert signal in response to finding one or more anomalies in the plurality of features to initiate a notification to a primary user device associated with the electronic circuit, and send a suspend notification signal to the electronic circuit in response to the finding of the one or more anomalies in the plurality of features. The electronic circuit is further configured to suspend use of the plurality of digital keys in response to reception of the suspend notification signal.
Owner:GM GLOBAL TECH OPERATIONS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products