Defending Mechanisms Against Sybil Attack in Next Generation Mobile Ad Hoc Networks

被引:8
|
作者
Pal, Sarit [1 ]
Mukhopadhyay, Asish K. [1 ]
Bhattacharya, Partha Pratim [1 ]
机构
[1] Dr BC Roy Engn Coll, Dept Elect & Commun Engn, Durgapur 713206, India
关键词
Network security; Information security; Impersonation attack; Sybil attack; AdHoc network;
D O I
10.4103/0256-4602.42813
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents techniques adopted to defend against Sybil Attack in Mobile Ad Hoc Networks. Sybil attack and the existing defense mechanisms against this type of attack have been reviewed and their loopholes are indicated. Multifactor Authentication Scheme has been discussed pointing out its superiority over traditional Cryptography-based Authentication Schemes. Afterwards, Passive Ad Hoc Sybil Identity Detection techniques differentiating a Sybil attacker from a group of legitimate nodes moving together is also discussed. Merits and demerits of these methods are mentioned and also the scopes for future research to improve these detection schemes have been indicated.
引用
收藏
页码:209 / 215
页数:7
相关论文
共 50 条
  • [1] Detecting the sybil attack in mobile ad hoc networks
    Piro, Chris
    Shields, Clay
    Levine, Brian Neil
    2006 SECURECOMM AND WORKSHOPS, 2006, : 285 - +
  • [2] Defense mechanisms against Sybil attack in vehicular ad hoc network
    Mohammadi, Mahdiyeh Ali
    Pouyan, Ali A.
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 917 - 936
  • [3] Survey on sybil attack defense mechanisms in wireless ad hoc networks
    Vasudeva, Amol
    Sood, Manu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 120 : 78 - 118
  • [4] Sybil Attack Defending Trusted AODV in Ad-hoc Netwok
    Hazra, Swarnali
    Setua, S. K.
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 643 - 647
  • [5] Defending against wormhole attacks in mobile ad hoc networks
    Wang, Weichao
    Bhargava, Bharat
    Lu, Yi
    Wu, Xiaoxin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (04): : 483 - 503
  • [6] Defending against packet dropping attack in vehicular ad hoc networks
    Djahel, Soufiene
    Nait-Abdesselam, Farid
    Zhang, Zonghua
    Khokhar, Ashfaq
    SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (03) : 245 - 258
  • [7] Defending Method Against Jamming Attack in Wireless Ad Hoc Networks
    Ben-Othman, Jalel
    Hamieh, Ali
    2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 758 - 762
  • [8] Efficient Analysis of Lightweight Sybil Attack Detection Scheme in Mobile Ad hoc Networks
    Mulla, Mohsin
    Sambare, Santosh
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [9] Collusion-Resistant Sybil Attack Detection Scheme in Mobile Ad hoc Networks
    Khan, Muhammad Sajid
    Iltaf, Naima
    Rashdi, Adnan
    2014 NATIONAL SOFTWARE ENGINEERING CONFERENCE (NSEC - 2014), 2014, : 30 - 36
  • [10] Design of the Next Generation Cognitive Mobile Ad Hoc Networks
    Ali, Amjad
    Wang Huiqiang
    Chen Xiaoming
    PIAGENG 2013: IMAGE PROCESSING AND PHOTONICS FOR AGRICULTURAL ENGINEERING, 2013, 8761