Mobile ad hoc networks (MANET) is a very
complicated distributed systems that comprise of mobile
nodes in wireless network that can easily and freely arrange
themselves into random and momentary ad hoc network
topologies as per the situation in network. The changing
topology and resource restriction are the main
characteristics which pose a number of tasks for efficient
and lightweight security protocols design. Centralized
identity management is not present in case of MANETs. The
requirements of a unique, distinct, and permanent identity
each node are primary requirements for their security
protocols, due to this Sybil attacks create a harmful threat
to such networks. Many or single identity in ad hoc
network, can be created by a Sybil attacker in order to
release coordinated attack on the network or can change
identities in order to make it weak for the detection process,
thereby alter it in lack of accountability in the network. This
is the research which will be implemented to detect the
identities created by attackers illegitimate node with a
lightweight scheme without using any extra hardware, like
directional antennae or a geographical positioning system.
Yamini D. Malkhede : Department of CSE, G. H. Raisoni Institute
of Engineering &Technology for Women,
Nagpur, Maharashtra, India
Purnima Selokar : Department of CSE, G. H. Raisoni Institute
of Engineering &Technology for Women,
Nagpur, , Maharashtra, India
Security
MANET
Sybil Attack
Intrusion
Detection in MANET
In this proposed scheme the RSS based detection
approach along with the authentication of node which will
correctly identified the Sybil identity with Higher True
Positive. Authentication of node allows only legitimate
node to come in to the network. As well as Lower-bound
detection threshold is used, and compare with Received
Signal Strength (RSS) value, if the comparison is greater
than or equal to RSS value, then it’s a Sybil identity
(Whitewash identity). Otherwise it’s a legitimate node in
the network. The scheme worked on the MAC layer using
the 802.11 protocol without the need for any extra
hardware. This will be demonstrated through various
experiments that a detection threshold exists for the
distinction of legitimate new nodes and new malicious
identities. This will confirmed this distinction rationale
through simulations. The simulation results showed that
our scheme works better even in mobile environments and
can detect both join-and-leave and simultaneous Sybil
attackers with a high degree of accuracy.
[1] Haiying Shen and Lianyu Zhao “ALERT: An
Anonymous Location-Based Efficient Routing Protocol
in MANETs” , IEEE transactions on mobile computing,
vol. 12, no. 6, June 2013.
[2] Sohail Abbas, Madjid Merabti, David Llewellyn-Jones,
and Kashif Kifayat,” Lightweight Sybil Attack
Detection in MANETs”, IEEE systems journal, vol. 7,
no. 2, June 2013
[3] Nidhi Joshi, Prof. Manoj Challa,” Secure Authentication
Protocol to Detect Sybil Attacks in MANETs”,
International Journal of Computer Science &
Engineering Technology (IJCSET) Vol. 5 No. 06 June
2014.
[4] K. Kayalvizhi, N. Senthilkumar , G. Arulkumaran,”
Detecting Sybil Attack by Using Received Signal
Strength in Manets”, (IJIRSE) International
[5] P.Kavitha, C.Keerthana, V.Niroja, V.Vivekanandhan,”
Mobile-id Based Sybil Attack detection on the Mobile
ADHOC Network”, International Journal of
Communication and Computer Technologies Volume 02
– No.02 Issue: 02 March 2014.
[6] S.Sharmila, G Umamaheswari,” Detection Of Sybil
Attack In Mobile Wireless Sensor Networks”,
International Journal Of Engineering Science &
Advanced Technology Volume-2, Issue-2, Mar-Apr 2012