Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio Visual Communication System

In recent time the use of communication gadgets (mobile phones, laptop, desktop etc.) and service for online communication between two parties over a long distance has become sine-qua-non. Some criminal minded people are using this online communication method to deceive their prey via proxy communic...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of advanced networking and applications 2017-07, Vol.9 (1), p.3335
Hauptverfasser: Nasiru, Lawal Olawale, Asafe, Yekini Nureni, Olamide, Oloyede Adetokunbo, Folusho, Akinsola Adeniyi
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 1
container_start_page 3335
container_title International journal of advanced networking and applications
container_volume 9
creator Nasiru, Lawal Olawale
Asafe, Yekini Nureni
Olamide, Oloyede Adetokunbo
Folusho, Akinsola Adeniyi
description In recent time the use of communication gadgets (mobile phones, laptop, desktop etc.) and service for online communication between two parties over a long distance has become sine-qua-non. Some criminal minded people are using this online communication method to deceive their prey via proxy communication where individual claiming to be discussing is not really the one. In this paper, we focus on prevention of identity impersonation attacks in an Online Communication System. Peer-peer Audio Visual Communication System is design to enhance security through online communication system by revealing the identity of the communicators and records the communication if necessary. Embedded application system was design for mobile and desktop devices for audio visual charting using modern IT devices.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_1949581982</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1949581982</sourcerecordid><originalsourceid>FETCH-proquest_journals_19495819823</originalsourceid><addsrcrecordid>eNqNiz0LwjAURYMoKNr_8MA5kFZrm7FUxU1BcS2xRn21TWo-BP-9HcTJwbucC_fcHhkxnsSURWnU_3bOhiSwtmJdFglLeTgit6V00hhUV9i_TlhD5pwo74AKtqpGJSHXTeMVlsKhVp1knWzgiQJ2UhrqNG07QubPqOGI1ov652VCBhdRWxl8OCbT9eqQb2hr9MNL64pKe6O6qQj5nMdpyNNo9p_1BvhGScw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1949581982</pqid></control><display><type>article</type><title>Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio Visual Communication System</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Nasiru, Lawal Olawale ; Asafe, Yekini Nureni ; Olamide, Oloyede Adetokunbo ; Folusho, Akinsola Adeniyi</creator><creatorcontrib>Nasiru, Lawal Olawale ; Asafe, Yekini Nureni ; Olamide, Oloyede Adetokunbo ; Folusho, Akinsola Adeniyi</creatorcontrib><description>In recent time the use of communication gadgets (mobile phones, laptop, desktop etc.) and service for online communication between two parties over a long distance has become sine-qua-non. Some criminal minded people are using this online communication method to deceive their prey via proxy communication where individual claiming to be discussing is not really the one. In this paper, we focus on prevention of identity impersonation attacks in an Online Communication System. Peer-peer Audio Visual Communication System is design to enhance security through online communication system by revealing the identity of the communicators and records the communication if necessary. Embedded application system was design for mobile and desktop devices for audio visual charting using modern IT devices.</description><identifier>ISSN: 0975-0290</identifier><identifier>EISSN: 0975-0282</identifier><language>eng</language><publisher>Eswar Publications</publisher><subject>Audio visual equipment ; Cellular telephones ; Communications systems ; Confidentiality ; Crime ; Cybercrime ; Cybersecurity ; Design ; Design engineering ; Distance learning ; Electronic devices ; Embedded systems ; Identity theft ; Mobile communication systems ; On-line systems ; Online instruction ; Peer to peer computing ; Prevention ; Training ; Verbal communication ; Visual communication</subject><ispartof>International journal of advanced networking and applications, 2017-07, Vol.9 (1), p.3335</ispartof><rights>Copyright Eswar Publications Jul/Aug 2017</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780</link.rule.ids></links><search><creatorcontrib>Nasiru, Lawal Olawale</creatorcontrib><creatorcontrib>Asafe, Yekini Nureni</creatorcontrib><creatorcontrib>Olamide, Oloyede Adetokunbo</creatorcontrib><creatorcontrib>Folusho, Akinsola Adeniyi</creatorcontrib><title>Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio Visual Communication System</title><title>International journal of advanced networking and applications</title><description>In recent time the use of communication gadgets (mobile phones, laptop, desktop etc.) and service for online communication between two parties over a long distance has become sine-qua-non. Some criminal minded people are using this online communication method to deceive their prey via proxy communication where individual claiming to be discussing is not really the one. In this paper, we focus on prevention of identity impersonation attacks in an Online Communication System. Peer-peer Audio Visual Communication System is design to enhance security through online communication system by revealing the identity of the communicators and records the communication if necessary. Embedded application system was design for mobile and desktop devices for audio visual charting using modern IT devices.</description><subject>Audio visual equipment</subject><subject>Cellular telephones</subject><subject>Communications systems</subject><subject>Confidentiality</subject><subject>Crime</subject><subject>Cybercrime</subject><subject>Cybersecurity</subject><subject>Design</subject><subject>Design engineering</subject><subject>Distance learning</subject><subject>Electronic devices</subject><subject>Embedded systems</subject><subject>Identity theft</subject><subject>Mobile communication systems</subject><subject>On-line systems</subject><subject>Online instruction</subject><subject>Peer to peer computing</subject><subject>Prevention</subject><subject>Training</subject><subject>Verbal communication</subject><subject>Visual communication</subject><issn>0975-0290</issn><issn>0975-0282</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqNiz0LwjAURYMoKNr_8MA5kFZrm7FUxU1BcS2xRn21TWo-BP-9HcTJwbucC_fcHhkxnsSURWnU_3bOhiSwtmJdFglLeTgit6V00hhUV9i_TlhD5pwo74AKtqpGJSHXTeMVlsKhVp1knWzgiQJ2UhrqNG07QubPqOGI1ov652VCBhdRWxl8OCbT9eqQb2hr9MNL64pKe6O6qQj5nMdpyNNo9p_1BvhGScw</recordid><startdate>20170701</startdate><enddate>20170701</enddate><creator>Nasiru, Lawal Olawale</creator><creator>Asafe, Yekini Nureni</creator><creator>Olamide, Oloyede Adetokunbo</creator><creator>Folusho, Akinsola Adeniyi</creator><general>Eswar Publications</general><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20170701</creationdate><title>Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio Visual Communication System</title><author>Nasiru, Lawal Olawale ; Asafe, Yekini Nureni ; Olamide, Oloyede Adetokunbo ; Folusho, Akinsola Adeniyi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_19495819823</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Audio visual equipment</topic><topic>Cellular telephones</topic><topic>Communications systems</topic><topic>Confidentiality</topic><topic>Crime</topic><topic>Cybercrime</topic><topic>Cybersecurity</topic><topic>Design</topic><topic>Design engineering</topic><topic>Distance learning</topic><topic>Electronic devices</topic><topic>Embedded systems</topic><topic>Identity theft</topic><topic>Mobile communication systems</topic><topic>On-line systems</topic><topic>Online instruction</topic><topic>Peer to peer computing</topic><topic>Prevention</topic><topic>Training</topic><topic>Verbal communication</topic><topic>Visual communication</topic><toplevel>online_resources</toplevel><creatorcontrib>Nasiru, Lawal Olawale</creatorcontrib><creatorcontrib>Asafe, Yekini Nureni</creatorcontrib><creatorcontrib>Olamide, Oloyede Adetokunbo</creatorcontrib><creatorcontrib>Folusho, Akinsola Adeniyi</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced networking and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Nasiru, Lawal Olawale</au><au>Asafe, Yekini Nureni</au><au>Olamide, Oloyede Adetokunbo</au><au>Folusho, Akinsola Adeniyi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio Visual Communication System</atitle><jtitle>International journal of advanced networking and applications</jtitle><date>2017-07-01</date><risdate>2017</risdate><volume>9</volume><issue>1</issue><spage>3335</spage><pages>3335-</pages><issn>0975-0290</issn><eissn>0975-0282</eissn><abstract>In recent time the use of communication gadgets (mobile phones, laptop, desktop etc.) and service for online communication between two parties over a long distance has become sine-qua-non. Some criminal minded people are using this online communication method to deceive their prey via proxy communication where individual claiming to be discussing is not really the one. In this paper, we focus on prevention of identity impersonation attacks in an Online Communication System. Peer-peer Audio Visual Communication System is design to enhance security through online communication system by revealing the identity of the communicators and records the communication if necessary. Embedded application system was design for mobile and desktop devices for audio visual charting using modern IT devices.</abstract><pub>Eswar Publications</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0975-0290
ispartof International journal of advanced networking and applications, 2017-07, Vol.9 (1), p.3335
issn 0975-0290
0975-0282
language eng
recordid cdi_proquest_journals_1949581982
source EZB-FREE-00999 freely available EZB journals
subjects Audio visual equipment
Cellular telephones
Communications systems
Confidentiality
Crime
Cybercrime
Cybersecurity
Design
Design engineering
Distance learning
Electronic devices
Embedded systems
Identity theft
Mobile communication systems
On-line systems
Online instruction
Peer to peer computing
Prevention
Training
Verbal communication
Visual communication
title Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio Visual Communication System
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T14%3A43%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Deterring%20Sybil%20Attack%20in%20Online%20Communication%20System%20via%20Peer-to-peer%20Audio%20Visual%20Communication%20System&rft.jtitle=International%20journal%20of%20advanced%20networking%20and%20applications&rft.au=Nasiru,%20Lawal%20Olawale&rft.date=2017-07-01&rft.volume=9&rft.issue=1&rft.spage=3335&rft.pages=3335-&rft.issn=0975-0290&rft.eissn=0975-0282&rft_id=info:doi/&rft_dat=%3Cproquest%3E1949581982%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1949581982&rft_id=info:pmid/&rfr_iscdi=true