Refine your search
Collections
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Nasiru, Lawal Olawale
- Deterring Sybil Attack in Online Communication System via Peer-To-Peer Audio Visual Communication System
Abstract Views :163 |
PDF Views:2
Authors
Lawal Olawale Nasiru
1,
Yekini Nureni Asafe
2,
Oloyede Adetokunbo Olamide
2,
Akinsola Adeniyi Folusho
2
Affiliations
1 Dept of Computer Engineering, Yaba College of Technology, NG
2 Dept of Computer Technology, Yaba College of Technology, NG
1 Dept of Computer Engineering, Yaba College of Technology, NG
2 Dept of Computer Technology, Yaba College of Technology, NG
Source
International Journal of Advanced Networking and Applications, Vol 9, No 1 (2017), Pagination: 3335-3337Abstract
In recent time the use of communication gadgets (mobile phones, laptop, desktop etc.) and service for online communication between two parties over a long distance has become sine-qua-non. Some criminal minded people are using this online communication method to deceive their prey via proxy communication where individual claiming to be discussing is not really the one. In this paper, we focus on prevention of identity impersonation attacks in an Online Communication System. Peer-peer Audio Visual Communication System is design to enhance security through online communication system by revealing the identity of the communicators and records the communication if necessary. Embedded application system was design for mobile and desktop devices for audio visual charting using modern IT devices.Keywords
Audio Visual Communication System, Online Communication, Sybil Attacks.References
- ] Wang, Liang; Kangasharju, Jussi (2012). "Real-world sybil attacks in BitTorrent mainline DHT". IEEE GLOBECOM. Retrieved 30 September 2013.
- ] Wang, Liang; Kangasharju, Jussi (2013). "Measuring Large-Scale Distributed Systems: Case of BitTorrent Mainline DHT" (PDF). IEEE Peer-to-Peer. Retrieved 30 September 2013.
- ] Yekini N. Nureni, Aigbokhan E. Edwin, Akinwole A. Kikelomo, Alakiri O. Harrison 2016: E‐Infrastructure and E‐Services Security Platform Using Multifactor Cybercrime Deterrent System: A Conceptual Model iSTEAMS Multidisciplinary Cross-Border Conference Accra Ghana 2016
- ] Graf, F. (2002), Providing security for eLearning. Computer & Graphics, 26(2), 355-365.
- ] Weippl, E., & Ebner, M. (2008). Security privacy challenges in e-learning 2.0. In World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (Vol. 2008, No. 1, pp. 4001-4007).
- ] Dietinger, T. (2003). Aspects of e-learning environments (Unpublished doctoral thesis). Institute for Information Processing and Computer Supported New Media (IICM), Graz University of Technology, Austria.