CFP last date
20 August 2024
Reseach Article

Impact of Sybil Attack and Security Threat in Mobile Adhoc Network

by Ankit Gupta, Deepak Sukheja, Amrita Tiwari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 124 - Number 9
Year of Publication: 2015
Authors: Ankit Gupta, Deepak Sukheja, Amrita Tiwari
10.5120/ijca2015904076

Ankit Gupta, Deepak Sukheja, Amrita Tiwari . Impact of Sybil Attack and Security Threat in Mobile Adhoc Network. International Journal of Computer Applications. 124, 9 ( August 2015), 5-12. DOI=10.5120/ijca2015904076

@article{ 10.5120/ijca2015904076,
author = { Ankit Gupta, Deepak Sukheja, Amrita Tiwari },
title = { Impact of Sybil Attack and Security Threat in Mobile Adhoc Network },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 124 },
number = { 9 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 5-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume124/number9/22129-2015904076/ },
doi = { 10.5120/ijca2015904076 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:13:55.035445+05:30
%A Ankit Gupta
%A Deepak Sukheja
%A Amrita Tiwari
%T Impact of Sybil Attack and Security Threat in Mobile Adhoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 124
%N 9
%P 5-12
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Network security in mobile Adhoc network is major issue. MANET system efficiency and security is compromised to create instability, disrupt network performance reducing fault tolerance, capability and attack on confidentiality, integrity and availably of information in network .the attack on adhoc is launched mainly in network layer to reducing Trust ship of system. Open nature communication makes wireless connection prone for various security threats. This paper consist a brief review of mobile ad-hoc network along with effect and vulnerabilities into same. It also enlists and explores the challenges to derive new mechanism over security threats. Subsequently, a compressive study has performed on Sybil Attack and its effect on ad-hoc networks. Work also consider some existing solution mitigate Sybil attack.

References
  1. John R. Douceur “The Sybil Attack “International workshop on Peer-To-Peer Systems” Pages 251-260 ISBN: 3-540-44179-4 Year 2002
  2. Piro, C “Detecting the Sybil Attack in Mobile Adhoc network” IEEE Securecomm and Workshops Page(s):1 – 11 E-ISBN: 1-4244-0423 Sept 2006
  3. G. Umamaheswar “Detection of Sybil Attack in Mobile Wireless Networks” International Journal of Engineering Science & Advanced Technology ISSN: 256 262 Vol.2 Issue-2 Page 256 – 262 Year 2012
  4. Security Issues and Sybil Attack in Wireless Sensor Networks International Journal of P2P Network Trends and Technology Volume3 Issue1- 2013
  5. Brian Neil Levine, Clay Shields ,N. Boris Margolin “Survey of solutions to the Sybil attack” Department of computer science, university of Massachusetts Page(s) 1-11 Year 2006
  6. Priyanka Sharma , Dr. Kamal Sharma, Surjeet Dalal “Preventing Sybil Attack In MANET Using Super Node Using Approach” International Journal of Recent Research Aspects, ISSN: 2349-7688, Vol. 1, Issue 2 pp. 25-30 Sept. 2014
  7. Anamika Pareek,Mayank Sharma “Architecture for detection of sybil attack in MANET using mac address” International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Issue 6, Volume 2 Page No.66-70, June 2015.
  8. Amol Vasudeva1 and Manu Sood “Sybil Attack On Lowest Id Clustering Algorithm In The Mobile Ad Hoc Network” International Journal of Network Security & Its Applications (IJNSA), ISSN: 0974 - 932 Vol.4, No.5 Pages 135-147, September 2012
  9. J. Newsome, E. Shi, D. Song, and A. Perrig “The Sybil attack in networks analysis & defences”, the 3rd International Symposium On Information Processing In Sensor NetworksPages 259-268 ISBN:1-58113-846-6 Year 2004
  10. Murat Demirbas, Youngwhan Song “An RSSI-based Scheme for Sybil Attack Detection in Wireless Networks” International Symposium on on World of Wireless, Mobile and Multimedia Networks ISBN:0-7695-2593-8 Page(s) 564-570 Year 2006
  11. Diogo Mónica “On the Use of Radio Resource Tests in Wireless ad hoc Networks” INESC-ID Page(s) 1-8 Year 2009
  12. Yue Liu “ A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities” IEEE Transactions on Mobile Computing ISSN 1536-1233 Issue 99 Feb 2015
  13. Chunling Cheng “An Approach Based on Chain Key Predistribution against Sybil Attack in Wireless Sensor Network” International Journal of Distributed Sensor Networks Vol. 2013 (2013), Article ID 839320, Page(s) 1-8 July 2013
  14. Debapriyay Mukhopadhyay, Indranil Saha “Location Verification Based Defense AgainstSybil Attack In Sensor Networks” 8th International Conference on Distributed Computing and Networking Pages 509-521 Online ISBN 978-3-540-68140-3 2013
  15. Makhdoom “A Novel Code Attestation Scheme Against Sybil Attack” Software Engineering Conference (NSEC), 2014 National11-12 Nov. 2014 Page(s):1 – 6 ISBN:978-1-4799-6161-0
Index Terms

Computer Science
Information Sciences

Keywords

MANET Sybil attack Network Security Node