Abstract
Mobile ad hoc networks (MANETs) require a unique, distinct, and persistent identity per node in order for their security protocols to be viable, Sybil attacks pose a serious threat to such networks. Fully self-organized MANETs represent complex distributed systems that may also be part of a huge complex system, such as a complex system-of-systems used for crisis management operations. Due to the complex nature of MANETs and its resource constraint nodes, there has always been a need to develop security solutions. A Sybil attacker can either create more than one identity on a single physical device in order to launch a coordinated attack on the network or can switch identities in order to weaken the detection process, thereby promoting lack of accountability in the network. In this research, we propose a scheme to detect the new identities of Sybil attackers without using centralized trusted third party or any extra hardware, such as directional antennae or a geographical positioning system. Through the help of extensive simulations, we are able to demonstrate that our proposed scheme detects Sybil identities with 95% accuracy (true positive) and about 5% error rate (false positive) even in the presence of mobility.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Douceur, J.R.: The Sybil attack. In International Workshop On Peer-To- Peer Systems, Mar 2002
Johnson, D., Maltz, D.: Dynamic source routing in ad hoc wireless networks. In: Mobile Computing, vol. 353. Kluwer Academic Publishers (1996)
Hu, Y., Perrig, A., Johnson, D.: Ariadne: a secure on-demand routing protocol for ad hoc networks. In: Proceedings of International Conference on Mobile Computing and Networking, Sept 2002
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of International Symposium on Information Processing in Sensor Networks (2004)
Nadeem, A., Howarth, M.P.: A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Commun. Surv. Tutorials 1–19 (2012)
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of the third international symposium on Information processing in sensor networks. ACM, Berkeley, California, USA (2004)
Douceur, J.R.: The Sybil attack. Presented at the Revised Papers from the first International Workshop on Peer-to-Peer Systems, pp. 251–260 (2002)
Abbas, S., Merabti, M., Llewellyn Jones, D., Kifayat, K.: Lightweight Sybil attack detection in MANETs. IEEE Syst. J. 7(2) (June 2013)
Kavitha, P., Keerthana, C., Niroja, V., Vivekanandhan, V.: Mobile-id based Sybil attack detection on the Mobile ADHOC Network. Int. Journal of Communication and Computer Technologies 2(2) (Mar 2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Sastry, A.S., Chitlapalli, S.S., Akhila, S. (2020). Work-in-Progress: A Novel Approach to Detection and Avoid Sybil Attack in MANET. In: Auer, M., Ram B., K. (eds) Cyber-physical Systems and Digital Twins. REV2019 2019. Lecture Notes in Networks and Systems, vol 80. Springer, Cham. https://doi.org/10.1007/978-3-030-23162-0_39
Download citation
DOI: https://doi.org/10.1007/978-3-030-23162-0_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-23161-3
Online ISBN: 978-3-030-23162-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)