Defending Mechanisms Against Sybil Attack in Next Generation Mobile Ad Hoc Networks

被引:8
|
作者
Pal, Sarit [1 ]
Mukhopadhyay, Asish K. [1 ]
Bhattacharya, Partha Pratim [1 ]
机构
[1] Dr BC Roy Engn Coll, Dept Elect & Commun Engn, Durgapur 713206, India
关键词
Network security; Information security; Impersonation attack; Sybil attack; AdHoc network;
D O I
10.4103/0256-4602.42813
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents techniques adopted to defend against Sybil Attack in Mobile Ad Hoc Networks. Sybil attack and the existing defense mechanisms against this type of attack have been reviewed and their loopholes are indicated. Multifactor Authentication Scheme has been discussed pointing out its superiority over traditional Cryptography-based Authentication Schemes. Afterwards, Passive Ad Hoc Sybil Identity Detection techniques differentiating a Sybil attacker from a group of legitimate nodes moving together is also discussed. Merits and demerits of these methods are mentioned and also the scopes for future research to improve these detection schemes have been indicated.
引用
收藏
页码:209 / 215
页数:7
相关论文
共 50 条
  • [41] Wormhole Attack Detection Technique in Mobile Ad Hoc Networks
    Kaur, Parvinder
    Kaur, Dalveer
    Mahajan, Rajiv
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) : 2939 - 2950
  • [42] SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
    Sharma, Sheenu
    Gupta, Roopam
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2009, 4 (02): : 243 - 250
  • [43] Effects of Denial of Service Attack in Mobile Ad Hoc Networks
    易平
    周雍凯
    吴越
    柳宁
    JournalofShanghaiJiaotongUniversity(Science), 2009, 14 (05) : 580 - 583
  • [44] An Approach for DDoS Attack Prevention in Mobile ad hoc Networks
    Timcenko, V. V.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (06) : 150 - 153
  • [45] Effects of denial of service attack in mobile ad hoc networks
    Yi P.
    Zhou Y.-K.
    Wu Y.
    Liu N.
    Journal of Shanghai Jiaotong University (Science), 2009, 14 (5) : 580 - 583
  • [46] Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks
    Tamilselvan, Latha
    Sankaranarayanan, V.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (03): : 118 - 123
  • [47] Sybil Attack Prevention and Detection in Vehicular Ad hoc Network
    Sharma, Aravendra Kumar
    Saroj, Sushil Kumar
    Chauhan, Sanjeev Kumar
    Saini, Sachin Kumar
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 594 - 599
  • [48] Defending against packet injection attacks in unreliable ad hoc networks
    Gu, QJ
    Liu, P
    Zhu, SC
    Chu, CH
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1837 - 1841
  • [49] Analysis of the node isolation attack against OLSR-based mobile ad hoc networks
    Kannhavong, Bounpadith
    Nakayama, Hidehisa
    Kato, Nei
    Nemoto, Yoshiaki
    Jamalipour, Abbas
    ISCN '06: PROCEEDINGS OF THE 7TH INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORKS, 2006, : 30 - +
  • [50] Sybil Attack Detection Technique Using Session Key Certificate in Vehicular Ad Hoc Networks
    Reddy, D. Srinivas
    Bapuji, V.
    Govardhan, A.
    Sarma, S. S. V. N.
    2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,