Abstract

It is quite a challenging task to achieve security in a mobile ad hoc network because of its open nature, dynamically changing topology, lack of infrastructure and central management. A particular harmful attack that takes the advantage of these characteristics is the Sybil attack, in which a malicious node illegitimately claims multiple identities. This attack can exceedingly disrupt various operations of the mobile ad hoc networks such as data aggregation, voting, fair resource allocation scheme, misbehavior detection and routing mechanisms etc. Two routing mechanisms known to be vulnerable to the Sybil attack in the mobile ad hoc networks are multi-path routing and geographic routing. In addition to these routing protocols, we show in this paper that the Sybil attack can also disrupt the head selection mechanism of the lowest ID cluster-based routing protocol. To the best of our knowledge, this is for the first time that a Sybil attack is shown to disrupt this cluster based routing protocol. To achieve this, we illustrate to have introduced a category of Sybil attack in which the malicious node varies its transmission power to create a number of virtual illegitimate nodes called Sybil nodes, for the purpose of communication with legitimate nodes of the Mobile Ad Hoc Network. The variation in the transmission power makes the Sybil attack more deadly and difficult to be detected.

Highlights

  • Mobile Ad hoc Network (MANET) has been the topic of interest among researchers for last two decades

  • We illustrate to have introduced a category of Sybil attack in which the malicious node varies its transmission power to create a number of virtual illegitimate nodes called Sybil nodes, for the purpose of communication with legitimate nodes of the Mobile Ad Hoc Network

  • If a number of malicious nodes are spread across all over the network, the impact of the Sybil attack will be more on this clustering scheme, as most of the clusters will be under the control of these Sybil attacker nodes

Read more

Summary

INTRODUCTION

Mobile Ad hoc Network (MANET) has been the topic of interest among researchers for last two decades. Sybil attacks are capable of disrupting the routing mechanisms in mobile ad hoc networks. A legitimate node may choose any of the Sybil nodes while forwarding the packet on the basis of nearest location to the destination node; but in reality it will be passing the packets through the malicious node In addition to these routing protocols, we have shown in this paper that the Sybil attack can disrupt the head selection mechanism of lowest ID based cluster routing algorithm. We illustrate to have introduced a category of Sybil attack in which the malicious node varies its transmission power to create a number of virtual illegitimate nodes called Sybil nodes, for the purpose of communication with legitimate nodes of the Mobile Ad Hoc Network.

SYBIL ATTACK
Communication
Participation
Identity
Effects of Sybil Attack in Mobile Ad Hoc Networks
Voting
Routing
LOWEST ID CLUSTERING ALGORITHM
SYBIL ATTACK IN LOWEST ID CLUSTERING ALGORITHM
Lowest ID Based Sybil Attack for Disruption of Lowest ID Clustering
Impersonation Based Sybil Attack Disrupting the Lowest ID Clustering
DETECTION MECHANISMS OF SYBIL ATTACK
CONCLUSION AND FUTURE WORK
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.