CFP last date
20 May 2024
Reseach Article

Intrusion Response System of Sybil Attack using DSR Protocol in MANET

by Manpreet Kaur, Manoj Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 169 - Number 3
Year of Publication: 2017
Authors: Manpreet Kaur, Manoj Kumar

Manpreet Kaur, Manoj Kumar . Intrusion Response System of Sybil Attack using DSR Protocol in MANET. International Journal of Computer Applications. 169, 3 ( Jul 2017), 25-29. DOI=10.5120/ijca2017914625

@article{ 10.5120/ijca2017914625,
author = { Manpreet Kaur, Manoj Kumar },
title = { Intrusion Response System of Sybil Attack using DSR Protocol in MANET },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2017 },
volume = { 169 },
number = { 3 },
month = { Jul },
year = { 2017 },
issn = { 0975-8887 },
pages = { 25-29 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2017914625 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-07T00:17:13.875262+05:30
%A Manpreet Kaur
%A Manoj Kumar
%T Intrusion Response System of Sybil Attack using DSR Protocol in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 169
%N 3
%P 25-29
%D 2017
%I Foundation of Computer Science (FCS), NY, USA

MANET is infrastructure less and independent network which consists various nodes. MANET is mobile ad hoc network having ability to connect various mobile nodes to each other. These nodes use wireless links to communicate with each other. In this paper, main aiming to present practical evaluation of efficient method for preventing and detecting Sybil attack. Sybil attack is an attack which uses several identities at a time and increases lot of misjudgments among the nodes of a network or it may use identity of other legitimate nodes present in the network and creates false expression of that node in the network. Like this, it disturbs the communication among the nodes of the network. This kind of attack results into major information loss and hence misinterpretation in the network, it also minimizes the trustworthiness among mobile nodes, data routing disturbing with aim of dropping them in n/w etc. There are many methods previously presented by different researchers with aim of mitigating such attacks from MANET with their own advantages and disadvantages. this paper is introducing the study of Intrusion Response System for lightweight Sybil attack using DSR in MANET. The practical analysis of this work is done using Network Simulator (NS2) by measuring throughput, end to end delay and packet delivery ratio under different network conditions.

  1. Mohsin Mulla and Santosh Sambare (2015) “Efficient Analysis of Lightweight Sybil Attack Detection Scheme in Mobile Ad hoc Networks” IEEE systems journal International Conference on Pervasive Computing (ICPC).
  2. J. R. Douceur (2002),”The Sybil Attack,'' presented at the Revised Papers from the first Int. Workshop on Peer-to-Peer Systems, pp.251-260,2002
  3. Anamika Pareek and Mayank Sharma (2015) “Detection and Prevention of Sybil Attack in MANET using MAC Address” International Journal of Computer Applications(0975-8887),Volume 122- No.21, July 2015
  4. M. Elboukhari, M. Azizi and A. Azizi (2015)," IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE" in International Journal of Grid Computing & Applications (IJGCA) June 2015, Vol.6, No.1/2.
  5. Z. Kasiran and J. Mohamad (2014), “Throughput performance analysis of the wormhole and sybil attack in AODV,” in IEEE 2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP), 2014, pp. 81–84.
  6. K. Patidar and V. Dubey(2014), “Modification in Routing Mechanism of AODV for Defending Blackhole and Wormhole Attacks,” IEEE Trans. Parallel Distrib. Syst., vol. 54, no. 7.
  7. P. Chahal,G.K. Tak, and A.S. Tomar (2015) “Comparative Analysis of Various Attacks on MANET ” International Journal of Computer Applications (0975 – 8887), February 2015, Volume 111 – No 12.
  8. R. Garg, H. Sharma (2014),“ Comparison between Sybil Attack Detection Techniques: Lightweight and Robust” in International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, 2014, Vol. 3, Issue 2.
  9. G. Garg, S. Kaushal, and A. Sharma(2014), “Reactive Protocols Analysis with Warmhole Attack in Ad-hoc Networks,” in IEEE ICCCNT 2014, no. 1, pp. 1–5.
  10. J. Biswas, A. Gupta, and D. Singh(2008), “WADP : A Wormhole Attack Detection And prevention Technique in MANET using Modified AODV routing Protocol,” in Springer Information Communication and Embedded Systems, pp. 1078–1085.
  11. S. Upadhyay and B. K. Chaurasia(2011), “Impact of Wormhole Attacks on MANETs”, 2011, vol. 2, Issue 1.
  12. C. B. Dutta and U. Biswas(2015), “Specification based IDS for Camouflaging Wormhole Attack in OLSR,” in IEEE 2015 23rd Mediterranean Conferance on Control and Automation (MED), pp. 960–966.
  13. Z. Han, L. Lu, and M. J. Hussain (2014), “Real-time and Passive Wormhole Detection for Wireless Sensor Networks,” in IEEE 2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP), pp. 978–985.
  14. P. Lee, S. Member, A. Clark, S. Member, L. Bushnell, and S. Member (2014), “A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems,” IEEE Trans. Autom. Control, vol. 59, no. 12, pp. 3224–3237.
  15. A. Patel, N. Patel, and R. Patel(2015), “Defending against Wormhole Attack in MANET,” in IEEE 2015 Fifth International Conference on Communication Systems and Network Technologies, pp. 674–678.
  16. V. Teotia and I. Woungang(2015), “Wormhole Prevention using COTA Mechanism in Position Based Environment over MANETs,” in IEEE ICC 2015- Communication Software, Services and Multimedia Applications Symposium,pp. 8664–8668.
  17. D.Aldhobaiban, K. Elleithy, and L. Almazaydeh(2014), “Prevention of Wormhole Attacks in Wireless Sensor Networks,” in IEEE 2014 2nd International Conference on Artificial Intelligence, Modelling and Simulation, pp. 287–291.
  18. S. Ji, T. Chen, S. Zhong, and S. Kak(2014), “DAWN: Defending against wormhole attacks in wireless network coding systems,” INFOCOM, 2014 Proc. IEEE, pp. 664–672.
  19. X. Feng, C. Li, D. Chen, and J. Tang (2016), “A method for defensing against multi-source Sybil attacks in VANET,” Springer Peer-to-Peer Netw. Appl., vol. 1, no. 9.
  20. Y. Liu, D. R. Bild, R. P. Dick, Z. M. Mao, and D. S. Wallach(2015), “The mason test: A defense against sybil attacks in wireless networks without trusted authorities,” IEEE Trans. Mob. Comput., vol. 14, no. 11, pp. 2376–2391.
  21. L. Alvisi, A. Clement, A. Epasto, S. Lattanzi, and A. Panconesi (2013), “SoK: The evolution of sybil defense via social networks,” Proc. - IEEE Symp. Secur. Priv., vol. 21, no. 2, pp. 382–396.
Index Terms

Computer Science
Information Sciences


MANET Sybil attack DSR NS2 Throughput end to end delay PDR