Defending Mechanisms Against Sybil Attack in Next Generation Mobile Ad Hoc Networks

被引:8
|
作者
Pal, Sarit [1 ]
Mukhopadhyay, Asish K. [1 ]
Bhattacharya, Partha Pratim [1 ]
机构
[1] Dr BC Roy Engn Coll, Dept Elect & Commun Engn, Durgapur 713206, India
关键词
Network security; Information security; Impersonation attack; Sybil attack; AdHoc network;
D O I
10.4103/0256-4602.42813
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents techniques adopted to defend against Sybil Attack in Mobile Ad Hoc Networks. Sybil attack and the existing defense mechanisms against this type of attack have been reviewed and their loopholes are indicated. Multifactor Authentication Scheme has been discussed pointing out its superiority over traditional Cryptography-based Authentication Schemes. Afterwards, Passive Ad Hoc Sybil Identity Detection techniques differentiating a Sybil attacker from a group of legitimate nodes moving together is also discussed. Merits and demerits of these methods are mentioned and also the scopes for future research to improve these detection schemes have been indicated.
引用
收藏
页码:209 / 215
页数:7
相关论文
共 50 条
  • [21] Stimulating cooperation and defending against attacks in self-organized mobile ad hoc networks
    Yu, W
    Liu, KJR
    2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005, : 65 - 75
  • [22] Defending Against Flooding Attacks in Mobile Ad-Hoc Networks Based on Statistical Analysis
    Mohammadi, Payam
    Ghaffari, Ali
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (02) : 365 - 376
  • [23] Defending Against Flooding Attacks in Mobile Ad-Hoc Networks Based on Statistical Analysis
    Payam Mohammadi
    Ali Ghaffari
    Wireless Personal Communications, 2019, 106 : 365 - 376
  • [24] Trace flooding attack in mobile ad hoc networks
    Guo, Yinghua
    Perreau, Sylvie
    PROCEEDINGS OF THE 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING, 2007, : 329 - 334
  • [25] Defending Sybil Attacks in Mobile Social Networks
    Sun, Yan
    Yin, Lihua
    Liu, Wenmao
    2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 163 - +
  • [26] Selfish Attack Detection in Mobile Ad hoc Networks
    Ghonge, Mangesh M.
    Jawandhiya, P. M.
    Thakare, V. M.
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [27] PERFORMANCE OF MOBILE AD HOC NETWORKS UNDER ATTACK
    Harb, Lamyaa M. T.
    Tantawy, M.
    Elsoudani, M.
    2013 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS TECHNOLOGY (ICCAT), 2013,
  • [28] Wormhole Attack in Mobile Ad-hoc Networks
    Sharma, Madhu
    Jain, Ashish
    Shah, Shweta
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [29] Curbing and Curing Sybil attack in Ad hoc Network
    Palanisamy, V.
    Annadurai, P.
    Vijilakshmi, S.
    FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 1 - +
  • [30] Effective filtering scheme against RREQ flooding attack in mobile Ad hoc Networks
    Song, Jian-Hua
    Hong, Fan
    Zhang, Yu
    SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2006, : 497 - +