Abstract

Identity disruption due to the new attack in peer to peer communication termed as Sybil attack. Sybil is a fake ID based malicious activity destroying the network behavior. Sybil activity corrupts the data and makes data loss during transmission. Sybil always interrupts a node when the node receives or sends data in a route. To avoid data loss due to Sybil activity, security must be provided for nodes at the time of data transmission. But at the time of providing security, the time complexity must be considered since sensors are battery powered devices. So, efficient Sybil attacks, security must be provided with low computational complexity. Sybil attack mitigation requires the central authority (administrator) with the one-key based single-identity and this is difficult in practical large scale nodes due to the high-cost manual monitoring. During the data transmission, the energy consumption of the nodes is more. Hence, the nodes in the selected path disrupt the communication that leads to utility-based routing strategy. Moreover, the Sybil attacks introduction interrupts the data transactions among the nodes. Hence, the new system is required to provide the trade-off between the energy, security, and Sybil attack controlling improvement. This paper focusses the trust assurance route formation with the energy and optimal cost basis. The matching and the positional verification according to the energy and trustworthiness of the nodes offer the better performance in Sybil attacks control. The provision of location information prior to data transmission, minimum energy cost route formation without attacks and the utility-based routing with the attacks provides the high-security level against the Sybil attacks.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.