Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Sybil Attack Detection in Mobile Adhoc Network  
  Authors : Yamini D. Malkhede; Purnima Selokar
  Cite as:

 

Mobile ad hoc networks (MANET) is a very complicated distributed systems that comprise of mobile nodes in wireless network that can easily and freely arrange themselves into random and momentary ad hoc network topologies as per the situation in network. The changing topology and resource restriction are the main characteristics which pose a number of tasks for efficient and lightweight security protocols design. Centralized identity management is not present in case of MANETs. The requirements of a unique, distinct, and permanent identity each node are primary requirements for their security protocols, due to this Sybil attacks create a harmful threat to such networks. Many or single identity in ad hoc network, can be created by a Sybil attacker in order to release coordinated attack on the network or can change identities in order to make it weak for the detection process, thereby alter it in lack of accountability in the network. This is the research which will be implemented to detect the identities created by attackers illegitimate node with a lightweight scheme without using any extra hardware, like directional antennae or a geographical positioning system.

 

Published In : IJCSN Journal Volume 4, Issue 3

Date of Publication : June 2015

Pages : 469 - 474

Figures :05

Tables : --

Publication Link : Sybil Attack Detection in Mobile Adhoc Network

 

 

 

Yamini D. Malkhede : Department of CSE, G. H. Raisoni Institute of Engineering &Technology for Women, Nagpur, Maharashtra, India

Purnima Selokar : Department of CSE, G. H. Raisoni Institute of Engineering &Technology for Women, Nagpur, , Maharashtra, India

 

 

 

 

 

 

 

Security

MANET

Sybil Attack

Intrusion Detection in MANET

In this proposed scheme the RSS based detection approach along with the authentication of node which will correctly identified the Sybil identity with Higher True Positive. Authentication of node allows only legitimate node to come in to the network. As well as Lower-bound detection threshold is used, and compare with Received Signal Strength (RSS) value, if the comparison is greater than or equal to RSS value, then it’s a Sybil identity (Whitewash identity). Otherwise it’s a legitimate node in the network. The scheme worked on the MAC layer using the 802.11 protocol without the need for any extra hardware. This will be demonstrated through various experiments that a detection threshold exists for the distinction of legitimate new nodes and new malicious identities. This will confirmed this distinction rationale through simulations. The simulation results showed that our scheme works better even in mobile environments and can detect both join-and-leave and simultaneous Sybil attackers with a high degree of accuracy.

 

 

 

 

 

 

 

 

 

[1] Haiying Shen and Lianyu Zhao “ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs” , IEEE transactions on mobile computing, vol. 12, no. 6, June 2013. [2] Sohail Abbas, Madjid Merabti, David Llewellyn-Jones, and Kashif Kifayat,” Lightweight Sybil Attack Detection in MANETs”, IEEE systems journal, vol. 7, no. 2, June 2013 [3] Nidhi Joshi, Prof. Manoj Challa,” Secure Authentication Protocol to Detect Sybil Attacks in MANETs”, International Journal of Computer Science & Engineering Technology (IJCSET) Vol. 5 No. 06 June 2014. [4] K. Kayalvizhi, N. Senthilkumar , G. Arulkumaran,” Detecting Sybil Attack by Using Received Signal Strength in Manets”, (IJIRSE) International [5] P.Kavitha, C.Keerthana, V.Niroja, V.Vivekanandhan,” Mobile-id Based Sybil Attack detection on the Mobile ADHOC Network”, International Journal of Communication and Computer Technologies Volume 02 – No.02 Issue: 02 March 2014. [6] S.Sharmila, G Umamaheswari,” Detection Of Sybil Attack In Mobile Wireless Sensor Networks”, International Journal Of Engineering Science & Advanced Technology Volume-2, Issue-2, Mar-Apr 2012