Analysis of Non Simultaneous Sybil Attack on DSR
نویسندگان
چکیده
Security is one of the most challenging issues in Mobile ad-hoc networks (MANETs). Most of the routing protocols in MANETs do not have an inbuilt mechanism to fight security attacks. Sybil attack is one such attack in which a single physical device takes on multiple identities in network thus behaving as multiple independent devices. With the help of these forged identities, the attacker can draw more benefits from the network by asking for more resources with the help of the multiple fake identities. The paper analyses the impact of Non-Simultaneous Sybil Attack on Dynamic Source Routing protocol (DSR). Its effect has been studied on performance metrics End to End Delay and Throughput.
منابع مشابه
Survey on Orthogonal Dimensions of Sybil Attack in Wireless Sensor Network
Wireless Sensor Networks (WSNs) continue to grow and become widely used in many applications in military, ecological, home automation and health-related areas. Due to distributed nature of sensor networks security becomes fundamental requirement for communication among sensor nodes. The inclusion of wireless communication among various sensor nodes suffers from various types of security threats...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملPreserving against Sybil Attack in Mobile Ad Hoc Network Using SYDECT Algorithm
MANET is a kind of wireless network which is decentralized in nature and comprise of moving mobile nodes. Due to changing topology of such network it impose critical security protocol design against harmful attacks such as Sybil Attack. In a Sybil attack a malicious node can produce and manage a large number of logical identities on a single physical device. This gives the misapprehension to th...
متن کاملCan Residential Wireless Lans Play
We present a P2P scheme that could fuel the deployment of free public wireless LANs (WLANs) in cities; these WLANs would complement existing and future cellular networks. We call our scheme the P2P Wireless Network Confederation (P2PWNC). Unlike existing approaches, P2PWNC does not rely on central planning or altruistic groups. In P2PWNC, wireless service is provided to those who provide servic...
متن کاملSignal and Time Based Fuzzy Cluster Scheme to Detect Sybil Attack in VANET
Security is an important issue in the VANET environment and the Sybil attack affects it the most. In Sybil attack a node illegally claims itself as a legitimate node using multiple identities. This paper systematically analyses about Sybil attack and its effect in the VANET. We establish a Signal and Time clustering (STC) algorithm to detect the Sybil attack in VANET. The scheme provides a low ...
متن کامل