Work-in-Progress: A Novel Approach to Detection and Avoid Sybil Attack in MANET

  • Anitha S. SastryEmail author
  • Sadhana S. Chitlapalli
  • S. Akhila
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 80)


Mobile ad hoc networks (MANETs) require a unique, distinct, and persistent identity per node in order for their security protocols to be viable, Sybil attacks pose a serious threat to such networks. Fully self-organized MANETs represent complex distributed systems that may also be part of a huge complex system, such as a complex system-of-systems used for crisis management operations. Due to the complex nature of MANETs and its resource constraint nodes, there has always been a need to develop security solutions. A Sybil attacker can either create more than one identity on a single physical device in order to launch a coordinated attack on the network or can switch identities in order to weaken the detection process, thereby promoting lack of accountability in the network. In this research, we propose a scheme to detect the new identities of Sybil attackers without using centralized trusted third party or any extra hardware, such as directional antennae or a geographical positioning system. Through the help of extensive simulations, we are able to demonstrate that our proposed scheme detects Sybil identities with 95% accuracy (true positive) and about 5% error rate (false positive) even in the presence of mobility.


Ad hoc network MANET Mobility Sybil attack 


  1. 1.
    Douceur, J.R.: The Sybil attack. In International Workshop On Peer-To- Peer Systems, Mar 2002Google Scholar
  2. 2.
    Johnson, D., Maltz, D.: Dynamic source routing in ad hoc wireless networks. In: Mobile Computing, vol. 353. Kluwer Academic Publishers (1996)Google Scholar
  3. 3.
    Hu, Y., Perrig, A., Johnson, D.: Ariadne: a secure on-demand routing protocol for ad hoc networks. In: Proceedings of International Conference on Mobile Computing and Networking, Sept 2002Google Scholar
  4. 4.
    Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of International Symposium on Information Processing in Sensor Networks (2004)Google Scholar
  5. 5.
    Nadeem, A., Howarth, M.P.: A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Commun. Surv. Tutorials 1–19 (2012)Google Scholar
  6. 6.
    Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of the third international symposium on Information processing in sensor networks. ACM, Berkeley, California, USA (2004)Google Scholar
  7. 7.
    Douceur, J.R.: The Sybil attack. Presented at the Revised Papers from the first International Workshop on Peer-to-Peer Systems, pp. 251–260 (2002)CrossRefGoogle Scholar
  8. 8.
    Abbas, S., Merabti, M., Llewellyn Jones, D., Kifayat, K.: Lightweight Sybil attack detection in MANETs. IEEE Syst. J. 7(2) (June 2013)CrossRefGoogle Scholar
  9. 9.
    Kavitha, P., Keerthana, C., Niroja, V., Vivekanandhan, V.: Mobile-id based Sybil attack detection on the Mobile ADHOC Network. Int. Journal of Communication and Computer Technologies 2(2) (Mar 2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Anitha S. Sastry
    • 1
    Email author
  • Sadhana S. Chitlapalli
    • 1
  • S. Akhila
    • 2
  1. 1.Department of ECEGlobal Academy of TechnologyBengaluruIndia
  2. 2.Department of ECEBMSCEBengaluruIndia

Personalised recommendations