CFP last date
20 January 2025
Reseach Article

Thwarting Sybil Attack using ElGamal Algorithm

by Shefali Khatri, Punit Sharma, Arvind Negi, Himanshu Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Number 21
Year of Publication: 2015
Authors: Shefali Khatri, Punit Sharma, Arvind Negi, Himanshu Gupta
10.5120/21828-5085

Shefali Khatri, Punit Sharma, Arvind Negi, Himanshu Gupta . Thwarting Sybil Attack using ElGamal Algorithm. International Journal of Computer Applications. 121, 21 ( July 2015), 44-48. DOI=10.5120/21828-5085

@article{ 10.5120/21828-5085,
author = { Shefali Khatri, Punit Sharma, Arvind Negi, Himanshu Gupta },
title = { Thwarting Sybil Attack using ElGamal Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 121 },
number = { 21 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 44-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume121/number21/21828-5085/ },
doi = { 10.5120/21828-5085 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:09:05.160065+05:30
%A Shefali Khatri
%A Punit Sharma
%A Arvind Negi
%A Himanshu Gupta
%T Thwarting Sybil Attack using ElGamal Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 121
%N 21
%P 44-48
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANET is an independent and infrastructureless network comprising of self configurable mobile nodes connected via wireless links. MANET is susceptible to various attacks because of some loopholes present in MANET like dynamic topology, zero central administration, limited physical security etc. MANET is prone to numerous malicious attacks one such attack among them is SYBIL ATTACK. In Sybil attack multiple identities are presented by a single physical node. This attack has serious impact on network functionality. In this paper principle focus is on preventing Sybil attacks using ElGamal algorithm. The concept of ElGamal algorithm has been used in this paper so as to deal with Sybil attacks.

References
  1. S. lahar," Security in MANET: Vulnerabilities, Attacks & Solutions", International Journal of Multidisciplinary and Current Research,ISSN: 2321-3124 ,Vol. 2 (Jan/Feb 2014 issue)
  2. N. Joshi & M. Challa," Secure Authentication Protocol to Detect Sybil Attacks in MANETs", International Journal of Computer Science & Engineering Technology (IJCSET), ISSN : 2229-3345, Vol. 5 No. 06 Jun 2014,
  3. D. Shehzad, Dr. A. I. Umar, N. Ul Amin, & WaqarIshaq," A Novel Mechanism for Detection of Sybil Attack in MANETs", International conference on Computer Science and Information Systems (ICSIS'2014) Oct 17-18, 2014 Dubai (UAE),
  4. H. N. Saha , Dr. D. Bhattacharyya & Dr. P. K. Banerjee , "Semi-Centralized Multi-Authenticated RSSI Based Solution to Sybil Attack", International Journal of Computer Science & Emerging Technologies (E-ISSN: 2044-6004) Volume 1, Issue 4, December 2010
  5. A. Paul, S. Sinha & S. Pal," An Efficient Method to Detect Sybil Attack using Trust based Model", Proc. of Int. Conf. on Advances in Computer Science, AETACS, Elsevier, 2013
  6. P. Singh & R. Bhardwaj, "Prevention of Sybil attacks in manet", International journal of Latest scientific research and technology 1(2),ISSN:2348-9464, July 2014.
  7. Balamalathy. N,Parvathi. S &Kumaresan. A, " AN EFFICIENT METHOD TO DETECT AND PREVENT SYBIL ATTACK", IJCSEC International Journal of Computer Science and Engineering Communications, Vol. 3, Issue 2, 2015, Page. 685-690, ISSN: 2347–8586
  8. X. Li, X. Shen & H. Chen, "ElGamal Digital Signature Algorithm of Adding a Random Number", JOURNAL OF NETWORKS, VOL. 6,NO. 5, MAY 2011
  9. P. Sharma & D. Dembla,"A Taxonomy of Network Layer Attacks against Wireless Sensor Networks",IJCSC, Vol. 4, Number 1 March 2013 pp. 81-85 ISSN-0973-7391
  10. C. Diwaker, S. Choudhary & P. Dabas," ATTACKS ON MOBILE AD-HOC NETWORKS",International Journal of Software and Web Sciences (IJSWS), International Association of Scientific Innovation and Research (IASIR), ISSN (Print): 2279-0063 ISSN (Online): 2279-0071
  11. Gagandeep, Aashima & P. Kumar," Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review", International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249 – 8958, Vol. 1, Issue-5, June 2012
  12. S. Boora, S. Ohri," A Survey of Layer Specific and Cryptographic Primitive attacks and their countermeasures in Manet's",International Journal of P2P Network Trends and Technology (IJPTT) –Vol. 3 Issue4- May 2013
Index Terms

Computer Science
Information Sciences

Keywords

MANET Random sub key swapping