In recent years, microblog systems such as Twitter and Sina Weibo have averaged multimillion active users. On the other hand, the microblog system has become a new means of rumor-spreading platform. In this paper, we investigate the machine-learning-based rumor identification approaches. We observed that feature design and selection has a stronger impact on the rumor identification accuracy than the selection of machine-learning algorithms. Meanwhile, the rumor publishers' behavior may diverge from normal users', and a rumor post may have different responses from a normal post. However, mass behavior on rumor posts has not been explored adequately. Hence, we investigate rumor identification schemes by applying five new features based on users' behaviors, and combine the new features with the existing well-proved effective user behaviorbased features, such as followers' comments and reposting, to predict whether a microblog post is a rumor. Experiment results on real-world data from Sina Weibo demonstrate the efficacy and efficiency of our proposed method and features. From the experiments, we conclude that the rumor detection based on mass behaviors is more effective than the detection based on microblogs' inherent features.
As nodes' characteristics that they are self-governed and resource-limited, wireless sensor networks (WSNs) face potential threats due to various attacks, among which the most threatening attack is wormhole attack. Wormhole attack severely imperils WSNs and is difficult to be detected, for it causes incorrect routing by private tunnels and damages to WSNs in terms of data leakage, data dropping, and delayed delivery. However, the existing solutions are based on additional hardware, incur high communication overhead, or fail to give consideration to all types of wormholes. In this paper, we propose CREDND, a protocol for creating a Credible Neighbor Discovery against wormholes in WSN, which can detect not only external wormholes through the hop difference between the own exclusive neighbors but also internal wormholes through enabling the common neighbor nodes as witnesses to monitor whether the authentication packets are forwarded by malicious nodes. CREDND is a simple, localized protocol and needs no special hardware, localization, or synchronization, but it improves the ability of wormhole defense. The simulation results are provided, showing that CREDND outperforms in wormhole detection than other same types of solutions. INDEX TERMS Secure neighborhood, neighbor discovery, network security, wireless sensor networks, wormhole attack.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.