An Effectual Secured Approach Against Sybil Attacks in Wireless Networks

被引:0
|
作者
Perumal S. [1 ]
机构
[1] College of Information Technology, Islamic Science University, Negeri Sembilan
关键词
Network security; Security in wireless environment; Wireless network security;
D O I
10.3991/ijim.v16i09.30213
中图分类号
学科分类号
摘要
In both wireless and mobile ad hoc networks, assaults can come from a variety of different sources. The terms “active attack” and “passive attack” describe these two types of attacks. In the network community, the Sybil attack is one of the most often used and deployed techniques for sniffing identities and repurposing them. Multiple identities or Sybil attacks have recently sparked a lot of interest in the research community. The algorithms and networks on which they are tested are vastly different among the many methods that have been offered. Since researchers can’t evaluate these systems side by side or test their efficacy on real-world social networks with a variety of structural features, it’s difficult to say whether there are any other (perhaps more efficient) methods of Sybil protection. In the event of a Sybil attack, the gatecrasher subverts the system framework’s notoriety arrangement by creating a large number of pseudonymous individuals and then using them to add an enormously imbalanced influence. Three factors determine a notoriety framework’s susceptibility to a Sybil attack: how quickly personalities can be generated, how much the notoriety framework accepts inputs from substances that lack a chain of trust, and if the notoriety framework handles all components equally. A large-scale Sybil ambush in Bittorrent Mainline may be accomplished in a cheap and effective manner, according to confirmation. A substance on a distributed system is a piece of software that has access to the resources of the local community. By displaying a character, a distributed system element reveals itself to the world. A single chemical can have an impact on more than one character. Numerous characters can be assigned to a single element. The personalities of substances in shared systems are used for the objectives of repetition, asset transfer, reliability, and trustworthiness, among other reasons. For remote elements to be aware of characters without necessarily being aware of the personality-to-neighborhood correlation, distributed systems make use of the character as a decision. Each different identification is normally considered to be associated with a separate local entity by convention. A single local entity may have several identities in actuality. In order to avoid and identify Sybil assaults, an empirical technique is used in this study. According to the base paper, any nodes with RSS greater than the provided threshold are regarded to be attackers under the present approach. A centralized way to monitor the mobile nodes is required to prevent this assault. As the server agent assumes full control of the ad-hoc network, malevolent nodes or selfish nodes are fully eliminated from the system © 2022. International Journal of Interactive Mobile Technologies.All Rights Reserved.
引用
收藏
页码:217 / 230
页数:13
相关论文
共 50 条
  • [41] Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information
    Sarigiannidis, Panagiotis
    Karapistoli, Eirini
    Economides, Anastasios A.
    EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (21) : 7560 - 7572
  • [42] Privacy Preserving Solution for the Protection Against Sybil Attacks in Vehicular Ad Hoc Networks
    Triki, Bayrem
    Rekhis, Slim
    Chammem, Mhamed
    Boudriga, Noureddine
    2013 6TH JOINT IFIP WIRELESS AND MOBILE NETWORKING CONFERENCE (WMNC 2013), 2013,
  • [43] Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
    Alsaedi, Noor
    Hashim, Fazirulhisyam
    Sali, A.
    Rokhani, Fakhrul Z.
    COMPUTER COMMUNICATIONS, 2017, 110 : 75 - 82
  • [44] Securing Wireless Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation Protocol
    Rizvi, Syed
    Gualdoni, Joseph
    Razaque, Abdul
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 721 - 726
  • [45] Security approaches for data aggregation in Wireless Sensor Networks against Sybil Attack
    Singh, Surinder
    Saini, Hardeep Singh
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 190 - 193
  • [46] A Novel Code Attestation Scheme Against Sybil Attack in Wireless Sensor Networks
    Makhdoom, Imran
    Afzal, Mehreen
    Rashid, Imran
    2014 NATIONAL SOFTWARE ENGINEERING CONFERENCE (NSEC - 2014), 2014, : 1 - 6
  • [47] Securing Link State Routing for Wireless Networks against Byzantine Attacks: A Monitoring Approach
    Ojetunde, Babatunde
    Shibata, Naoki
    Gao, Juntao
    2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2017, : 596 - 601
  • [48] Adaptive topologies against jamming attacks in wireless networks: A game-theoretic approach
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 121 : 44 - 58
  • [49] PROTECTION AGAINST BYZANTINE ATTACKS ON WIRELESS SENSOR NETWORKS
    Stelte, Bjoern
    2011 PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEMS (WINSYS 2011), 2011, : 53 - 58
  • [50] A Countermeasure to Defend Against Relay Attacks in Wireless Networks
    Tang, Caimu
    Wu, Dapeng Oliver
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,