3,140 research outputs found

    Sybil Attack Analysis and Detection Techniques in MANET

    Get PDF
    Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node Illegitimately claims multiple identities.Mobility cause a main problem when we talk about security in Mobile Ad-hoc networks. It doesn’t depend on fixed architecture, the nodes are continuously moving in a random fashion. In this article we will focus on identifying the Sybil attack in MANET. It uses air medium for communication so it is more prone to the attack. Sybil attack is one in which single node present multiple fake identities to other nodes, which cause destruction

    Sybil attacks against mobile users: friends and foes to the rescue

    Get PDF
    Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely been designed for peer-to-peer networks but not for mobile networks. That is why we propose a new decentralized defence for portable devices and call it MobID. The idea is that a device manages two small networks in which it stores information about the devices it meets: its network of friends contains honest devices, and its network of foes contains suspicious devices. By reasoning on these two networks, the device is then able to determine whether an unknown individual is carrying out a sybil attack or not. We evaluate the extent to which MobID reduces the number of interactions with sybil attackers and consequently enables collaborative applications.We do so using real mobility and social network data. We also assess computational and communication costs of MobID on mobile phones

    Detecting Sybil Attack in Blockchain and Preventing through Universal Unique Identifier in Health Care Sector for privacy preservation

    Get PDF
    Health care data requires data secrecy, confidentiality, and distribution through public networks. Blockchain is the latest and most secure framework through which health care data can be transferred on the public network. Blockchain has gained attention in recent year’s due to its decentralized, distributed, and immutable ledger framework. However, Blockchain is also susceptible to many attacks in the permission less network, one such attack is known as Sybil attack, where several malicious nodes are created by the single node and gain multiple undue advantages over the network. In this research work, the Blockchain network is created using the smart contract method which gets hampered due to Sybil attack. Thus, a novel method is proposed to prevent Sybil attack in the network for privacy preservation. Universal Unique Identifier code is used for identification and prevention of the Sybil attack in the self-created networks. Results depict that proposed method correctly identifies the chances of attack and the prevention from the attack. The approach has been evaluated on performance metrics namely, true positive rate and accuracy which were attained as 87.5 % and 91% respectively, in the small network. This demonstrates that the proposed work attains improved results as compared to other latest available methods

    Identity Mapping Scheme with CBDS Approach to Secure MANET

    Get PDF
    A MANET is considered as self administrating network in which nodes are free to come and join to communicate with various nodes. A network which has a lot of advantages for its characteristics also has disadvantage of being attacked by some malicious node. Since MANET requires that each node should posses a unique, distinct identity, Sybil attack is one of the major threat to MANET. A Sybil attack is in which a node can have different physical identity to weak the distributed MANET system. In this paper, we propose a identity mapping scheme which is implemented with the collaborative bait detection scheme for securing MANET against Sybil attack, black hole attack and gray hole attack. Approach is merged with the CBDS approach for making system more secure against various attacks. Proposed scheme is simulated on NS2 and compared with the Sybil detection scheme on various performance metrics

    Guaranteeing Spoof-Resilient Multi-Robot Networks

    Get PDF
    Multi-robot networks use wireless communication to provide wide-ranging services such as aerial surveillance and unmanned delivery. However, effective coordination between multiple robots requires trust, making them particularly vulnerable to cyber-attacks. Specifically, such networks can be gravely disrupted by the Sybil attack, where even a single malicious robot can spoof a large number of fake clients. This paper proposes a new solution to defend against the Sybil attack, without requiring expensive cryptographic key-distribution. Our core contribution is a novel algorithm implemented on commercial Wi-Fi radios that can "sense" spoofers using the physics of wireless signals. We derive theoretical guarantees on how this algorithm bounds the impact of the Sybil Attack on a broad class of robotic coverage problems. We experimentally validate our claims using a team of AscTec quadrotor servers and iRobot Create ground clients, and demonstrate spoofer detection rates over 96%

    Detection and Mitigation of Sybil Attack by implementing Extended Genetic Algorithm

    Get PDF
    Today, there are several available technologies designed to build vehicular road travel easier, secure, and more enjoyable, utilizing proximity sensors, geographical positioning system, multimedia communication, etc. Although VANET is a popular application that has strengthens its roots since the last decade and made our lives much easier than ever before. But still there are various security issues in it that need to be considered. One of the major security issues relating VANET is the Sybil attack. The Sybil attack is a major threatening attack in which the attack creates several forge identities of itself in order to gain trust of the authenticated nodes to fulfill its malice presence. In this paper we will implement genetic algorithm for mitigating the Sybil attack. GA is a search technique that depends on the natural selection and genetics principles and which determines an optimal solution for even a hard issue

    Comparison between Sybil Attack Detection Technique: Lightweight and Robust,”

    Get PDF
    ABSTRACT: Mobile ad-hoc network (MANET) is an independent network which consists of many nodes and these nodes uses wireless links to communicate with each other. The infrastructure less nature of MANET makes it vulnerable to various attacks. There is an attack which causes many serious threats to the network and it is known as Sybil attack. In Sybil attack, attackers or malicious nodes uses many identities or IP addresses to gain control over the network and creates lots of misconception among nodes present in the network. In this paper two approaches are discussed to detect the Sybil Attack, one is Lightweight Sybil Attack Detection Approach and other is Robust Sybil Attack Detection Approach

    Evading and Averting the Sybil Attack in Manets Using Mac Hash Message Algorithm

    Get PDF
    The security loopholes present in the wireless network especially MANET makes it vulnerable and weak. Most of the users are much concerned about the very security of the network and hesitate to participate actively in the transactions. Very powerful and strange attacks are pinpointed by many research scholars in the past. The Sybil attack is one of the most detrimental attacks imparted on MANETS where plethora of authentic nodes are faked and forged to enable illegal entry into a network to disrupt the very security of the MANET. The Sybil attack acts and simulates like an existing node present in the network to get unauthorized access into the network. To prevent and evade this a new algorithm using the MAC is employed in this paper. The proposed algorithm MAC Hash Message – MHM algorithm will detect, prevent and eliminate the Sybil attack completely and provides a hassle free transaction to the nodes present in the MANET

    Detection of Sybil Attack for P2P Security in MANETs

    Get PDF
    A MANET is an infrastructure-less type networks, which consists of the number of mobile nodes with wireless network interfaces Sybil attack is a serious threat for today’s wireless adhoc networks. In this attack a single node pretends several other nodes using various malicious means.  Here we considered Topology based routing protocols like DSDV and DSR for the detection of SYBIL attacks in P2P system. Performance metrics such as packet delivery fraction, throughput, and end-to-end delay are evaluated using NS-2. Keywords – Mobile Ad-hoc networks, Sybil attack, NS 2
    • …
    corecore