Abstract

Wireless ad hoc networks are vulnerable to Sybil attacks due to the broadcast nature of the wireless medium and an absence of central authority. In a Sybil attack, an adversary illegitimately claims to have multiple imaginary identities, called Sybil nodes. This attack is capable of vitiating various operations of these networks such as data aggregation, voting-based mechanisms, fair resource allocation schemes, misbehavior detection, and routing mechanisms. In this paper, we present a survey on the most promising techniques offered thus far to defend the three classes of ad hoc networks, i.e., Mobile Ad hoc Networks, Wireless Sensor Networks, and Wireless Mesh Networks, from the Sybil attack. The techniques include symmetric cryptography using a central authority, random key pre-distribution (key pool, single-space pairwise, and multi-space pairwise), radio resource testing, received signal strength indicator, time difference of arrival, neighborhood data, passive ad hoc Sybil identity detection, passive ad hoc Sybil identity with group detection, and energy trust-based system. Specifically, we analyze various approaches to mitigate the Sybil attack, together with their advantages and disadvantages. We emphasize making all of the concepts very clear and easily understandable to learners and researchers who are interested or planning to work in this area. To achieve this clarity, we illustrate all of the Sybil defense mechanisms with suitable examples and diagrams. In addition, we discuss the challenging research issues and future directions for mitigating the Sybil attack in wireless ad hoc networks.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.