CFP last date
20 January 2025
Reseach Article

A Novel Technique for Sybil Attack Detection and Prevention in MANET

by Priya Jain, Rashmi Nigoti
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 9
Year of Publication: 2015
Authors: Priya Jain, Rashmi Nigoti
10.5120/ijca2015907083

Priya Jain, Rashmi Nigoti . A Novel Technique for Sybil Attack Detection and Prevention in MANET. International Journal of Computer Applications. 130, 9 ( November 2015), 1-6. DOI=10.5120/ijca2015907083

@article{ 10.5120/ijca2015907083,
author = { Priya Jain, Rashmi Nigoti },
title = { A Novel Technique for Sybil Attack Detection and Prevention in MANET },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 9 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number9/23234-2015907083/ },
doi = { 10.5120/ijca2015907083 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:24:53.293834+05:30
%A Priya Jain
%A Rashmi Nigoti
%T A Novel Technique for Sybil Attack Detection and Prevention in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 9
%P 1-6
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The attacker quickly affected the routing performance and drops the all packets that contain some data for receiver. This research proposed the Sybil Detection and Prevention (SDP) against Sybil attack. The property of this attack is to reply with every neighbors through multiple recognition (MR) value of itself i.e. fake identity, fake generated specification of itself in dynamic network. Routing protocols for MANET must handle obsolete routing information to hold the dynamically changeable topology. Incorrect routing information accomplished by malicious nodes to extent drop of packets, be considered malicious information. Whereas there are adequately many correct nodes, the SDP is able to find routes that deviates from these compromise nodes and provides secure path in between source to designation. The SDP has detected the malicious nodes and capture the malicious information of MR value generated in MANET. The SDP has immobilized the malicious functioning of Sybil attacker and enhance routing performance in presence of attacker. The better routing performance is devalued through performance parameters such as throughput and packets drop. The proposed scheme is improves throughput, minimizes data loss and provides secure routing.

References
  1. S. Ci et al., “Self-Regulating Network Utilization in Mobile Ad-Hoc Wireless Networks,” IEEE Trans. Vehicle. Tech., vol. 55, no. 4, pp. 1302–1310, July 2006.
  2. C. S. R. Murthy and B. S. Manoj, Ad Hoc Wireless Networks: Architectures and Protocols, Prentice Hall PTR, 2004.
  3. K. Kuladinith, A. S. Timm-Giel, and C. Görg, “Mobile ad-hoc communications in AEC industry,” J. Inf. Technol. Const., vol. 9, pp. 313–323, 2004.
  4. M. Zapata and N. Asokan, “Securing Ad Hoc Routing Protocols,” in Proceeding of ACM Workshop on Wireless Security, pp. 1–10, 2002.
  5. L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press, Aug. 2007.
  6. Pradip M. Jawandhiya, Mangesh M. Ghonge, Dr. M.S. Ali, Prof. J.S. Deshpande, " A Survey of Mobile Ad Hoc Network Attacks", International Journal of Engineering Science and Technology, Vol. 2(9), pp. 4063-4071, 2010.
  7. Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei , “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks ,”Wireless/Mobile Network Security, Y. Xiao, X. Shen, and D.-Z. Du (Eds.) pp. 1-38, @ 2006 Springer.
  8. J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil attack in sensor networks: Analysis and defences,” presented at the 3rd Int. Symposium of Information Processing in Sensor Networks (IPSN), pp. 259–268., 2004
  9. G. Jayakumar and G. Gopinath, “Ad Hoc Mobile Wireless Networks Routing Protocol—A Review,” Journal of Computer. Science, Vol. 3, No. 8, pp. 574–582, 2007.
  10. C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” Proc. ACM SIGCOMM, 1994.
  11. C. Perkins, E. Belding-Royer, and S. Das, “Ad Hoc On demand Distance Vector (AODV) Routing,” IETF RFC 3561, July 2003.
  12. D. B. Johnson and D. A. Maltz, “Dynamic Source Routing in Ad-Hoc Wireless Networks,” T. Imielinski and H. Korth, ed., Mobile Computing, Kluwer Academic Publishers, pp. 153–81, 1996.
  13. Z. J. Haas and M. R. Pearlman, “The Performance of Query Control Schemes for the Zone Routing Protocol,” IEEE/ACM Trans. Net., vol. 9, no. 4, pp. 427–38, 2001.
  14. Sohail Abbas, Madjid Merabti, David Llewellyn-Jones, and Kashif Kifayat ,“Lightweight Sybil Attack Detection in MANETs” IEEE Systems Journal, Vol. 7, No. 2, pp. 236 To 248, June 2013.
  15. Muhammad Nawaz Khan, Muhammad Ilyas Khatak, Muhammad Faisal “Intrusion Detection System for Ad hoc Mobile Networks” International Journal of Computer Applications (0975 – 8887) Volume 35– No.2, December 2011.
  16. Liang Xiao, Student Member, IEEE, Larry J. Greenstein, Life Fellow, IEEE, Narayan B. Mandayam, Fellow, IEEE, “Channel-Based Detection of Sybil Attacks in Wireless Networks” IEEE Transactions on Information Forensics And Security, Vol. 4, No. 3, September 2009
  17. S. Capkun, J. P. Hubaux, and L. Buttyan, “Mobility helps peer-to-peer security,” IEEE Transaction Mobile Computing., vol. 5, no. 1, pp. 43–51, Jan. 2006
  18. C. Piro, C. Shields, and B. N. Levine, “Detecting the Sybil attack in mobile ad hoc networks,” in Proceeding of Secure Communication Workshops, pp. 1–11, 2006.
  19. Network Simulator-ns-2 Tutorial Available on link, http://www.isi.edu/nsnam/ns/tutorial/index.html.
Index Terms

Computer Science
Information Sciences

Keywords

Security MANET SDP Routing Sybil attacker