2020 Seventh International Conference on Software Defined Systems (SDS) 2020
DOI: 10.1109/sds49854.2020.9143886
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Encounter-based Social Sybil Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…The main differences with the traditional decentralized protocols are the presence of the encryption and the total absence of a trusted central authority. Blockchain solutions for contact tracing have been recently addressed in [23], where the authors proposed that digitally signed pairwise encounters between mobile devices are stored in a distributed ledger and then some form of machine learning algorithms, such as deep learning networks, are used to identify the close social contacts.…”
Section: Terminology and Conceptual Definitionsmentioning
confidence: 99%
“…The main differences with the traditional decentralized protocols are the presence of the encryption and the total absence of a trusted central authority. Blockchain solutions for contact tracing have been recently addressed in [23], where the authors proposed that digitally signed pairwise encounters between mobile devices are stored in a distributed ledger and then some form of machine learning algorithms, such as deep learning networks, are used to identify the close social contacts.…”
Section: Terminology and Conceptual Definitionsmentioning
confidence: 99%
“…Yet another approach may be to use location information or wireless signal strength as the basis for a Sybil control mechanism [35,36]. Another approach could be to use proof of social Contacts [37], which leverages encounter information between mobile nodes to detect and blacklist Sybil nodes.…”
Section: Mobile-device-oriented Sybil Controlmentioning
confidence: 99%
“…Yet another approach may be to use location information or wireless signal strength as the basis for a Sybil control mechanism [30]- [31]. Another approach could be to use Proof of Social Contacts [32], which leverages encounter information between mobile nodes to detect and blacklist Sybil nodes.…”
Section: Mobile-device Oriented Sybil Controlmentioning
confidence: 99%