CFP last date
20 January 2025
Reseach Article

Analysis of Non Simultaneous Sybil Attack on DSR

by Tripti Sharma, Leenu Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 109 - Number 9
Year of Publication: 2015
Authors: Tripti Sharma, Leenu Singh
10.5120/19215-0936

Tripti Sharma, Leenu Singh . Analysis of Non Simultaneous Sybil Attack on DSR. International Journal of Computer Applications. 109, 9 ( January 2015), 8-10. DOI=10.5120/19215-0936

@article{ 10.5120/19215-0936,
author = { Tripti Sharma, Leenu Singh },
title = { Analysis of Non Simultaneous Sybil Attack on DSR },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 109 },
number = { 9 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 8-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume109/number9/19215-0936/ },
doi = { 10.5120/19215-0936 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:44:20.227001+05:30
%A Tripti Sharma
%A Leenu Singh
%T Analysis of Non Simultaneous Sybil Attack on DSR
%J International Journal of Computer Applications
%@ 0975-8887
%V 109
%N 9
%P 8-10
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is one of the most challenging issues in Mobile ad-hoc networks (MANETs). Most of the routing protocols in MANETs do not have an inbuilt mechanism to fight security attacks. Sybil attack is one such attack in which a single physical device takes on multiple identities in network thus behaving as multiple independent devices. With the help of these forged identities, the attacker can draw more benefits from the network by asking for more resources with the help of the multiple fake identities. The paper analyses the impact of Non-Simultaneous Sybil Attack on Dynamic Source Routing protocol (DSR). Its effect has been studied on performance metrics - End to End Delay and Throughput.

References
  1. Douceur, J. R. , "The Sybil Attack," presented at the Revised Papers from the First Int. Workshop on Peer-to-Peer Systems, pp. 251–260, 2002.
  2. Newsome, J. , Shi, E. , Song, D. , Perrig, A. , "The Sybil Attack in Sensor Networks: Analysis and Defenses," presented at the 3rd Int. Symp. Information Processing in Sensor Networks (IPSN), pp. 259–268, 2004,.
  3. Johnson, D. B. , Maltz, D. A. , Hu, Y. C. , and Jetcheva, J. G. , "The Dynamic Source Routing Protocol For Mobile Ad hoc Networks", IETF Internet draft, draft-ietf-manet-dsr-04. txt, November 2000.
  4. Mohaisen, A. , Kim, J. , "The Sybil Attack And Defenses: A Survey, Smart Computing Review, vol. 3, no. 6, December 2013.
  5. Vasudevand, A. , Sood, M. , "Sybil Attack On Lowest id Clustering Algorithm In The Mobile Ad hoc Network". International Journal of Network Security & Its Applications (IJNSA), Vol. 4, No. 5, September 2012
  6. Salehi, M. , Samavati, H. , Dehghan, M. , "Evaluation of DSR Protocol Under A New Black Hole Attack", Electrical Engineering (ICEE), 2012 20th Iranian Conference on , vol. , no. , pp. 640,644, 15-17 May 2012 doi: 10. 1109/IranianCEE. 2012. 629243.
  7. Agrawal, R. , Tripathi, R. , Tiwari, S. , "Performance Evaluation and Comparison of AODV and DSR Under Adversarial Environment," Computational Intelligence and Communication Networks (CICN), 2011 International Conference on, vol. , no. , pp. 596,600, 7-9 Oct. 2011
  8. Salehi, M. , Samavati, H. , "DSR vs OLSR: Simulation Based Comparison of Ad Hoc Reactive and Proactive Algorithms Under the Effect of New Routing Attacks," Next Generation Mobile Applications, Services and Technologies (NGMAST), 2012 6th International Conference on , vol. , no. , pp. 100,105, 12-14 Sept. 2012.
  9. Ahuja, R. , Ahuja, A. B. , Ahuja, P. , "Performance Evaluation and Comparison of AODV and DSR Routing Protocols in MANETs Under Wormhole Attack," Image Information Processing (ICIIP), 2013 IEEE Second International Conference on , vol. , no. , pp. 699,702, 9-11 Dec. 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad-hoc Networks Sybil Attack DSR Network Security.