Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Detection and Prevention of Sybil Attack in MANET using MAC Address

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 122 - Number 21
Year of Publication: 2015
Authors:
Anamika Pareek
Mayank Sharma
10.5120/21849-5167

Anamika Pareek and Mayank Sharma. Article: Detection and Prevention of Sybil Attack in MANET using MAC Address. International Journal of Computer Applications 122(21):20-23, July 2015. Full text available. BibTeX

@article{key:article,
	author = {Anamika Pareek and Mayank Sharma},
	title = {Article: Detection and Prevention of Sybil Attack in MANET using MAC Address},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {122},
	number = {21},
	pages = {20-23},
	month = {July},
	note = {Full text available}
}

Abstract

A Mobile Adhoc Network is a network that does not relay on fixed infrastructure . It is a collection of independent mobile nodes that can communicate to each other via radio waves. These networks are fully distributed, and can work at any place without the help of any fixed infrastructure as access points or base stations. As in ad- hoc network communication medium is air so it would be easy for attacker to fetch information from air medium using sniffing software tool. There is an attack which causes so much destruction to a network called Sybil attack. In the Sybil attack a single node presents multiple fake identities to other nodes in the network. In this research, we implemented the Sybil Attack Detection technique which is used to detect the Sybil nodes in the network and also prevent it. Simulation tool used for the implementation is NS2. 35.

References

  • Adnan Nadeem and Michael P. Howarth,``A survey of MANET Intrusion Detection & Prevention Approaches for Network layer Attacks,'' IEEE Communication Surveys & Tutorials, pp. 1-19, 2012.
  • J. R. Douceur,"The Sybil Attack,'' presented at the Revised Papers from the first Int. Workshop on Peer-to-Peer Systems, pp. 251-260,2002
  • C. Piro, C. Shields, and B. N. Levine, "Detecting the Sybil attack in mobile ad hoc networks," in Proc. Securecomm Workshops, 2006, pp. 1–11
  • Yu, H. , M. Kaminsky, P. Gibbons, & A. Flaxman . Sybilguard: Defending against sybil attacks via social networks. Networking, IEEE/ACM Transactions on 16 (3), 576–589 2008.
  • J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis &defenses," in Proceedings of the third internationalsymposium on Information processing in sensor networks. Berkeley, California, USA: ACM, 2004.
  • Roopali Garg, Himika harma "Proposed Lightweight Sybil Attack Detection Technique in MANET" International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 3, Issue 5, May 2014
  • Nidhi Joshi,Prof Manoj Challa,"Secure Authentication Protocol to Detect Sybil Attacks in MANETs" International Journal of Computer Science & Engineering Technology (IJCSET), ISSN : 2229-3345 Vol. 5 No. 06 Jun 2014
  • Danish Shehzad, Dr. Arif Iqbal Umar, Noor Ul Amin, and WaqarIshaq" A Novel Mechanism for Detection of Sybil Attack in MANETs" International conference on Computer Science and Information Systems (ICSIS'2014) Oct 17-18, 2014 Dubai (UA).
  • Sohail Abbas, Madjid Merabti, David Llewellyn Jones, and Kashif Kifayat," Lightweight Sybil Attack Detection in MANETs", IEEE systems journal, vol. 7, no. 2, June 2013.
  • Yamini D Malkhede,Purnima Selokar "ANALYSIS OF SYBIL ATTACK DETECTION IN MOBILE ADHOC NETWORK" Proceedings of 19 th IRF International Conference , 1st February 2015, Pune, India, ISBN: 978-93-84209-85-8.
  • P. Kavitha, C. Keerthana, V. Niroja, V. Vivekanandhan," Mobile-id Based Sybil Attack detection on the Mobile ADHOC Network", International Journal of Communication and Computer Technologies Volume 02–No. 02 Issue: 02 March 2014