Call for Paper - January 2022 Edition
IJCA solicits original research papers for the January 2022 Edition. Last date of manuscript submission is December 20, 2021. Read More

Intrusion Response System of Sybil Attack using DSR Protocol in MANET

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Manpreet Kaur, Manoj Kumar

Manpreet Kaur and Manoj Kumar. Intrusion Response System of Sybil Attack using DSR Protocol in MANET. International Journal of Computer Applications 169(3):25-29, July 2017. BibTeX

	author = {Manpreet Kaur and Manoj Kumar},
	title = {Intrusion Response System of Sybil Attack using DSR Protocol in MANET},
	journal = {International Journal of Computer Applications},
	issue_date = {July 2017},
	volume = {169},
	number = {3},
	month = {Jul},
	year = {2017},
	issn = {0975-8887},
	pages = {25-29},
	numpages = {5},
	url = {},
	doi = {10.5120/ijca2017914625},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


MANET is infrastructure less and independent network which consists various nodes. MANET is mobile ad hoc network having ability to connect various mobile nodes to each other. These nodes use wireless links to communicate with each other. In this paper, main aiming to present practical evaluation of efficient method for preventing and detecting Sybil attack. Sybil attack is an attack which uses several identities at a time and increases lot of misjudgments among the nodes of a network or it may use identity of other legitimate nodes present in the network and creates false expression of that node in the network. Like this, it disturbs the communication among the nodes of the network. This kind of attack results into major information loss and hence misinterpretation in the network, it also minimizes the trustworthiness among mobile nodes, data routing disturbing with aim of dropping them in n/w etc. There are many methods previously presented by different researchers with aim of mitigating such attacks from MANET with their own advantages and disadvantages. this paper is introducing the study of Intrusion Response System for lightweight Sybil attack using DSR in MANET. The practical analysis of this work is done using Network Simulator (NS2) by measuring throughput, end to end delay and packet delivery ratio under different network conditions.


  1. Mohsin Mulla and Santosh Sambare (2015) “Efficient Analysis of Lightweight Sybil Attack Detection Scheme in Mobile Ad hoc Networks” IEEE systems journal International Conference on Pervasive Computing (ICPC).
  2. J. R. Douceur (2002),”The Sybil Attack,'' presented at the Revised Papers from the first Int. Workshop on Peer-to-Peer Systems, pp.251-260,2002
  3. Anamika Pareek and Mayank Sharma (2015) “Detection and Prevention of Sybil Attack in MANET using MAC Address” International Journal of Computer Applications(0975-8887),Volume 122- No.21, July 2015
  4. M. Elboukhari, M. Azizi and A. Azizi (2015)," IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE" in International Journal of Grid Computing & Applications (IJGCA) June 2015, Vol.6, No.1/2.
  5. Z. Kasiran and J. Mohamad (2014), “Throughput performance analysis of the wormhole and sybil attack in AODV,” in IEEE 2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP), 2014, pp. 81–84.
  6. K. Patidar and V. Dubey(2014), “Modification in Routing Mechanism of AODV for Defending Blackhole and Wormhole Attacks,” IEEE Trans. Parallel Distrib. Syst., vol. 54, no. 7.
  7. P. Chahal,G.K. Tak, and A.S. Tomar (2015) “Comparative Analysis of Various Attacks on MANET ” International Journal of Computer Applications (0975 – 8887), February 2015, Volume 111 – No 12.
  8. R. Garg, H. Sharma (2014),“ Comparison between Sybil Attack Detection Techniques: Lightweight and Robust” in International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, 2014, Vol. 3, Issue 2.
  9. G. Garg, S. Kaushal, and A. Sharma(2014), “Reactive Protocols Analysis with Warmhole Attack in Ad-hoc Networks,” in IEEE ICCCNT 2014, no. 1, pp. 1–5.
  10. J. Biswas, A. Gupta, and D. Singh(2008), “WADP : A Wormhole Attack Detection And prevention Technique in MANET using Modified AODV routing Protocol,” in Springer Information Communication and Embedded Systems, pp. 1078–1085.
  11. S. Upadhyay and B. K. Chaurasia(2011), “Impact of Wormhole Attacks on MANETs”, 2011, vol. 2, Issue 1.
  12. C. B. Dutta and U. Biswas(2015), “Specification based IDS for Camouflaging Wormhole Attack in OLSR,” in IEEE 2015 23rd Mediterranean Conferance on Control and Automation (MED), pp. 960–966.
  13. Z. Han, L. Lu, and M. J. Hussain (2014), “Real-time and Passive Wormhole Detection for Wireless Sensor Networks,” in IEEE 2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP), pp. 978–985.
  14. P. Lee, S. Member, A. Clark, S. Member, L. Bushnell, and S. Member (2014), “A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems,” IEEE Trans. Autom. Control, vol. 59, no. 12, pp. 3224–3237.
  15. A. Patel, N. Patel, and R. Patel(2015), “Defending against Wormhole Attack in MANET,” in IEEE 2015 Fifth International Conference on Communication Systems and Network Technologies, pp. 674–678.
  16. V. Teotia and I. Woungang(2015), “Wormhole Prevention using COTA Mechanism in Position Based Environment over MANETs,” in IEEE ICC 2015- Communication Software, Services and Multimedia Applications Symposium,pp. 8664–8668.
  17. D.Aldhobaiban, K. Elleithy, and L. Almazaydeh(2014), “Prevention of Wormhole Attacks in Wireless Sensor Networks,” in IEEE 2014 2nd International Conference on Artificial Intelligence, Modelling and Simulation, pp. 287–291.
  18. S. Ji, T. Chen, S. Zhong, and S. Kak(2014), “DAWN: Defending against wormhole attacks in wireless network coding systems,” INFOCOM, 2014 Proc. IEEE, pp. 664–672.
  19. X. Feng, C. Li, D. Chen, and J. Tang (2016), “A method for defensing against multi-source Sybil attacks in VANET,” Springer Peer-to-Peer Netw. Appl., vol. 1, no. 9.
  20. Y. Liu, D. R. Bild, R. P. Dick, Z. M. Mao, and D. S. Wallach(2015), “The mason test: A defense against sybil attacks in wireless networks without trusted authorities,” IEEE Trans. Mob. Comput., vol. 14, no. 11, pp. 2376–2391.
  21. L. Alvisi, A. Clement, A. Epasto, S. Lattanzi, and A. Panconesi (2013), “SoK: The evolution of sybil defense via social networks,” Proc. - IEEE Symp. Secur. Priv., vol. 21, no. 2, pp. 382–396.


MANET, Sybil attack, DSR, NS2, Throughput, end to end delay, PDR