Analysis of Non Simultaneous Sybil Attack on DSR

نویسندگان

  • Tripti Sharma
  • Leenu Singh
چکیده

Security is one of the most challenging issues in Mobile ad-hoc networks (MANETs). Most of the routing protocols in MANETs do not have an inbuilt mechanism to fight security attacks. Sybil attack is one such attack in which a single physical device takes on multiple identities in network thus behaving as multiple independent devices. With the help of these forged identities, the attacker can draw more benefits from the network by asking for more resources with the help of the multiple fake identities. The paper analyses the impact of Non-Simultaneous Sybil Attack on Dynamic Source Routing protocol (DSR). Its effect has been studied on performance metrics End to End Delay and Throughput.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survey on Orthogonal Dimensions of Sybil Attack in Wireless Sensor Network

Wireless Sensor Networks (WSNs) continue to grow and become widely used in many applications in military, ecological, home automation and health-related areas. Due to distributed nature of sensor networks security becomes fundamental requirement for communication among sensor nodes. The inclusion of wireless communication among various sensor nodes suffers from various types of security threats...

متن کامل

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

Preserving against Sybil Attack in Mobile Ad Hoc Network Using SYDECT Algorithm

MANET is a kind of wireless network which is decentralized in nature and comprise of moving mobile nodes. Due to changing topology of such network it impose critical security protocol design against harmful attacks such as Sybil Attack. In a Sybil attack a malicious node can produce and manage a large number of logical identities on a single physical device. This gives the misapprehension to th...

متن کامل

Can Residential Wireless Lans Play

We present a P2P scheme that could fuel the deployment of free public wireless LANs (WLANs) in cities; these WLANs would complement existing and future cellular networks. We call our scheme the P2P Wireless Network Confederation (P2PWNC). Unlike existing approaches, P2PWNC does not rely on central planning or altruistic groups. In P2PWNC, wireless service is provided to those who provide servic...

متن کامل

Signal and Time Based Fuzzy Cluster Scheme to Detect Sybil Attack in VANET

Security is an important issue in the VANET environment and the Sybil attack affects it the most. In Sybil attack a node illegally claims itself as a legitimate node using multiple identities. This paper systematically analyses about Sybil attack and its effect in the VANET. We establish a Signal and Time clustering (STC) algorithm to detect the Sybil attack in VANET. The scheme provides a low ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015