Detecting and Resolving the Sybil Attack in Manet Using Rss Algorithm

نویسندگان

  • K. Vaijayanthi
  • M. Baskar
  • M. Phil
چکیده

The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc Network (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. With the improvements of the technology and cut in hardware costs, we are witnessing a current trend of expanding MANETs into industrial applications. To adjust to such trend, we strongly believe that it is vital to address its potential security issues. The propose and implement a new intrusion-detection system named Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher maliciousbehavior-detection rates in certain circumstances while does not greatly affect the network performances.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Thwarting Sybil Attack using ElGamal Algorithm

MANET is an independent and infrastructureless network comprising of self configurable mobile nodes connected via wireless links. MANET is susceptible to various attacks because of some loopholes present in MANET like dynamic topology, zero central administration, limited physical security etc. MANET is prone to numerous malicious attacks one such attack among them is SYBIL ATTACK. In Sybil att...

متن کامل

A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack in MANETs

Mobile Ad-hoc Network (MANET) is a quite challenging to ensures security because if it’s open nature, lack of infrastructure, and high mobility of nodes. MANETs is a fast changing network in a form of decentralized wireless system. It requires a unique, distinct and persistent identity per node in order to provide their security and also has become an indivisible part for communication for mobi...

متن کامل

Preserving against Sybil Attack in Mobile Ad Hoc Network Using SYDECT Algorithm

MANET is a kind of wireless network which is decentralized in nature and comprise of moving mobile nodes. Due to changing topology of such network it impose critical security protocol design against harmful attacks such as Sybil Attack. In a Sybil attack a malicious node can produce and manage a large number of logical identities on a single physical device. This gives the misapprehension to th...

متن کامل

Secure Authentication Protocol to Detect Sybil Attacks in MANETs

Mobile ad-hoc networks (MANETs) are well known to be susceptible to various attacks, due to features such as lack of centralized control, dynamic topology, limited physical security and energy constrained operations. In this paper, we focus on preventing Sybil attack and Intruder nodes (malicious node). We are presenting a novel and secure authentication of nodes as soon as they comes in to the...

متن کامل

An Efficient Method to Detect Sybil Attack using Trust based Model

Sybil attack is one of the most severe attacks in the vast domain of ad-hoc network. Mobile Ad-hoc Network (MANET) has to face this attack in its different application areas due to its inherent properties like mobility, absence of centralized infrastructure and limited resources. In this paper the threats of Sybil attacks in different environment of MANET is discussed briefly and taxonomy of va...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014