Detection Of Sybil Attack For P2P Security In MANETs

M. Reshma*, V. Sowmya Devi**
* M.Tech Scholar, Department of Computer Science and Engineering, GITAM University, Hyderabad, India.
** Assistant Professor, Department of Computer Science and Engineering, GITAM University, Hyderabad, India.
Periodicity:August - October'2014
DOI : https://doi.org/10.26634/jmt.1.3.3273

Abstract

A MANET is an infrastructure-less type network, which consists of the number of mobile nodes with wireless network interfaces. Sybil attack is a serious threat for today's wireless adhoc networks. In sybil attack, a single node pretends several other nodes using various malicious means. Here the authors considered the Topology based routing protocols like DSDV and DSR for the detection of sybil attacks in P2P system. Performance metrics such as packet delivery fraction, throughput and end-to-end delay are evaluated using NS-2.

Keywords

Mobile Ad-hoc Networks, Sybil Attack, NS-2 (Network Simulator).

How to Cite this Article?

Reshma, M., and Devi, V.S. (2014). Detection Of Sybil Attack For P2P Security In MANETs . i-manager’s Journal on Mobile Applications and Technologies, 1(3), 16-20. https://doi.org/10.26634/jmt.1.3.3273

References

[1]. Pankaj Rohal, Ruchika Dahiya and Prashant Dahiya (2013). “Study and Analysis of Throughput, Delay and Packet Delivery Ratio in MANET for Topology Based Routing Protocols (AODV, DSR and DSDV)”, IJARET, ISSN-2320-6802, Vol. 1, No. 2, pp. 54-58.
[2]. Priyanka Goyal,Sahil Batra and Ajit Singh (2010). “A Literature Review of Security Attack in Mobile Ad-hoc Networks ”, International Journal of Computer Applications (ISSN-0975 – 8887), Vol. 9, No.12, pp. 11-15.
[3]. Aniruddha Bhattacharyya, Arnab Banerjee and Dipayan Bose (2011). “Different types of attacks in Mobile ADHOC Network: Prevention and mitigation techniques”, arXiv.org.
[4]. Gagandeep, Aashima, Pawan Kumar, (2012). “Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review”, International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249 – 8958, Vol. 1, No. 5, pp. 269-275.
[5]. Himadri Nath Saha, Debika Bhattacharyya, P. K. Banerjee, (2010). “Semi-Centralized Multi-Authenticated RSSI Based Solution to Sybil Attack”, International Journal of Computer Science & Emerging Technologies, E-ISSN: 2044-6004, Vol. 1, No. 4, pp. 338-341.
[6]. Manjeet Singh, Gaganpreet Kaur, (2013). “A Surveys of Attacks in MANET”, International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Vol. 3, No. 6, pp. 1631- 1636.
[7]. J. Newsome, E. Shi, D. Song, and A. Perrig, (2004). “The Sybil attack in sensor networks: analysis & defences”, In Proceedings of the third international symposium on Information processing in sensor networks, pp. 259–268.
[8]. M. Al-Shurman, S. M. Yoo, and S. Park, (2004). “Black Hole Attack in Mobile Ad Hoc Networks,” ACM Southeast Regional Conf., pp. 96-97.
[9]. Nor Surayati Mohamad Usop, Azizol Abdullah and Ahmad Faisal Amri Abidin (2009).“Performance Evaluation of AODV, DSDV & DSR Routing Protocol in Grid Environment”, IJCSNS International Journal of Computer Science and Network Security, Vol. 9, No.7, pp. 261-268.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.