Sybil Attack

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 3933 Experts worldwide ranked by ideXlab platform

Manu Sood - One of the best experts on this subject based on the ideXlab platform.

  • survey on Sybil Attack defense mechanisms in wireless ad hoc networks
    Journal of Network and Computer Applications, 2018
    Co-Authors: Amol Vasudeva, Manu Sood
    Abstract:

    Abstract Wireless ad hoc networks are vulnerable to Sybil Attacks due to the broadcast nature of the wireless medium and an absence of central authority. In a Sybil Attack, an adversary illegitimately claims to have multiple imaginary identities, called Sybil nodes. This Attack is capable of vitiating various operations of these networks such as data aggregation, voting-based mechanisms, fair resource allocation schemes, misbehavior detection, and routing mechanisms. In this paper, we present a survey on the most promising techniques offered thus far to defend the three classes of ad hoc networks, i.e., Mobile Ad hoc Networks, Wireless Sensor Networks, and Wireless Mesh Networks, from the Sybil Attack. The techniques include symmetric cryptography using a central authority, random key pre-distribution (key pool, single-space pairwise, and multi-space pairwise), radio resource testing, received signal strength indicator, time difference of arrival, neighborhood data, passive ad hoc Sybil identity detection, passive ad hoc Sybil identity with group detection, and energy trust-based system. Specifically, we analyze various approaches to mitigate the Sybil Attack, together with their advantages and disadvantages. We emphasize making all of the concepts very clear and easily understandable to learners and researchers who are interested or planning to work in this area. To achieve this clarity, we illustrate all of the Sybil defense mechanisms with suitable examples and diagrams. In addition, we discuss the challenging research issues and future directions for mitigating the Sybil Attack in wireless ad hoc networks.

  • a vampire act of Sybil Attack on the highest node degree clustering in mobile ad hoc networks
    Indian journal of science and technology, 2016
    Co-Authors: Amol Vasudeva, Manu Sood, Prem Prakash
    Abstract:

    Objective: This paper aims at analyzing the devastating effect of Sybil Attack in Mobile Ad hoc NETworks (MANETs) that use the Highest Node Degree based Clustering scheme for routing. Method/Analysis: A Sybil Attack can disrupt the highest node degree based clustering scheme in MANETs by impersonating the identity of a legitimate node. An Attacker will put all its efforts in forcibly electing its prey node as the leader of a cluster. In making its mission successful, an Attacker uses a number of ghost identities to interact with the prey node, and hence increasing the connectivity of that prey node. It can achieve this by allowing its multiple Sybil nodes to communicate directly with a legitimate prey node. In other words, all the Sybil nodes contribute to increase the node degree of a particular prey node, so as to make it a cluster head. The Sybil Attack can play the same trick on the same prey node in every cluster formation process by following the direction and movement the prey node. After making this prey node as a cluster head the multiple Sybil nodes can start sucking its battery by communicating with the bogus messages. Once the battery of the prey node is drained completely, the Sybil Attacker can impersonate its identity to further disrupt the network system. Findings: We have used Java language to simulate the vampire act of Sybil Attack in MANETs. All the results obtained from the experiments prove that a Sybil Attack succeeded with high probability, in forcibly re-electing the same prey node as a leader of the cluster. Novelty: The vampire act of Sybil Attack on the maximum connectivity based clustering is shown for the first time in this paper.

  • Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc Network
    Lecture Notes in Electrical Engineering, 2013
    Co-Authors: Manu Sood, Amol Vasudeva
    Abstract:

    It is cumbersome to achieve the security in a mobile ad hoc network due to its open nature, dynamically changing topology, lack of infrastructure and central management. A particular harmful Attack that takes the advantage of these characteristics is the Sybil Attack, in which a malicious node illegitimately claims multiple identities. Two routing mechanisms vulnerable to the Sybil Attack in the mobile ad hoc networks are multi-path routing and geographic routing. In addition to these routing protocols, we show in this paper that the Sybil Attack can also disrupt the head selection mechanism of various cluster-based routing protocols such as lowest id, highest node degree and mobility based clustering. To achieve this, we illustrate to have introduced a category of Sybil Attack in which the malicious node varies its transmission power to create a number of virtual illegitimate nodes called Sybil Nodes, for the purpose of communication with legitimate nodes of the MANETs.

  • Sybil Attack ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORK
    International Journal of Network Security & Its Applications, 2012
    Co-Authors: Amol Vasudeva, Manu Sood
    Abstract:

    It is quite a challenging task to achieve security in a mobile ad hoc network because of its open nature, dynamically changing topology, lack of infrastructure and central management. A particular harmful Attack that takes the advantage of these characteristics is the Sybil Attack, in which a malicious node illegitimately claims multiple identities. This Attack can exceedingly disrupt various operations of the mobile ad hoc networks such as data aggregation, voting, fair resource allocation scheme, misbehavior detection and routing mechanisms etc. Two routing mechanisms known to be vulnerable to the Sybil Attack in the mobile ad hoc networks are multi-path routing and geographic routing. In addition to these routing protocols, we show in this paper that the Sybil Attack can also disrupt the head selection mechanism of the lowest ID cluster-based routing protocol. To the best of our knowledge, this is for the first time that a Sybil Attack is shown to disrupt this cluster based routing protocol. To achieve this, we illustrate to have introduced a category of Sybil Attack in which the malicious node varies its transmission power to create a number of virtual illegitimate nodes called Sybil nodes, for the purpose of communication with legitimate nodes of the Mobile Ad Hoc Network. The variation in the transmission power makes the Sybil Attack more deadly and difficult to be detected.

Amol Vasudeva - One of the best experts on this subject based on the ideXlab platform.

  • survey on Sybil Attack defense mechanisms in wireless ad hoc networks
    Journal of Network and Computer Applications, 2018
    Co-Authors: Amol Vasudeva, Manu Sood
    Abstract:

    Abstract Wireless ad hoc networks are vulnerable to Sybil Attacks due to the broadcast nature of the wireless medium and an absence of central authority. In a Sybil Attack, an adversary illegitimately claims to have multiple imaginary identities, called Sybil nodes. This Attack is capable of vitiating various operations of these networks such as data aggregation, voting-based mechanisms, fair resource allocation schemes, misbehavior detection, and routing mechanisms. In this paper, we present a survey on the most promising techniques offered thus far to defend the three classes of ad hoc networks, i.e., Mobile Ad hoc Networks, Wireless Sensor Networks, and Wireless Mesh Networks, from the Sybil Attack. The techniques include symmetric cryptography using a central authority, random key pre-distribution (key pool, single-space pairwise, and multi-space pairwise), radio resource testing, received signal strength indicator, time difference of arrival, neighborhood data, passive ad hoc Sybil identity detection, passive ad hoc Sybil identity with group detection, and energy trust-based system. Specifically, we analyze various approaches to mitigate the Sybil Attack, together with their advantages and disadvantages. We emphasize making all of the concepts very clear and easily understandable to learners and researchers who are interested or planning to work in this area. To achieve this clarity, we illustrate all of the Sybil defense mechanisms with suitable examples and diagrams. In addition, we discuss the challenging research issues and future directions for mitigating the Sybil Attack in wireless ad hoc networks.

  • a vampire act of Sybil Attack on the highest node degree clustering in mobile ad hoc networks
    Indian journal of science and technology, 2016
    Co-Authors: Amol Vasudeva, Manu Sood, Prem Prakash
    Abstract:

    Objective: This paper aims at analyzing the devastating effect of Sybil Attack in Mobile Ad hoc NETworks (MANETs) that use the Highest Node Degree based Clustering scheme for routing. Method/Analysis: A Sybil Attack can disrupt the highest node degree based clustering scheme in MANETs by impersonating the identity of a legitimate node. An Attacker will put all its efforts in forcibly electing its prey node as the leader of a cluster. In making its mission successful, an Attacker uses a number of ghost identities to interact with the prey node, and hence increasing the connectivity of that prey node. It can achieve this by allowing its multiple Sybil nodes to communicate directly with a legitimate prey node. In other words, all the Sybil nodes contribute to increase the node degree of a particular prey node, so as to make it a cluster head. The Sybil Attack can play the same trick on the same prey node in every cluster formation process by following the direction and movement the prey node. After making this prey node as a cluster head the multiple Sybil nodes can start sucking its battery by communicating with the bogus messages. Once the battery of the prey node is drained completely, the Sybil Attacker can impersonate its identity to further disrupt the network system. Findings: We have used Java language to simulate the vampire act of Sybil Attack in MANETs. All the results obtained from the experiments prove that a Sybil Attack succeeded with high probability, in forcibly re-electing the same prey node as a leader of the cluster. Novelty: The vampire act of Sybil Attack on the maximum connectivity based clustering is shown for the first time in this paper.

  • Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc Network
    Lecture Notes in Electrical Engineering, 2013
    Co-Authors: Manu Sood, Amol Vasudeva
    Abstract:

    It is cumbersome to achieve the security in a mobile ad hoc network due to its open nature, dynamically changing topology, lack of infrastructure and central management. A particular harmful Attack that takes the advantage of these characteristics is the Sybil Attack, in which a malicious node illegitimately claims multiple identities. Two routing mechanisms vulnerable to the Sybil Attack in the mobile ad hoc networks are multi-path routing and geographic routing. In addition to these routing protocols, we show in this paper that the Sybil Attack can also disrupt the head selection mechanism of various cluster-based routing protocols such as lowest id, highest node degree and mobility based clustering. To achieve this, we illustrate to have introduced a category of Sybil Attack in which the malicious node varies its transmission power to create a number of virtual illegitimate nodes called Sybil Nodes, for the purpose of communication with legitimate nodes of the MANETs.

  • Sybil Attack ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORK
    International Journal of Network Security & Its Applications, 2012
    Co-Authors: Amol Vasudeva, Manu Sood
    Abstract:

    It is quite a challenging task to achieve security in a mobile ad hoc network because of its open nature, dynamically changing topology, lack of infrastructure and central management. A particular harmful Attack that takes the advantage of these characteristics is the Sybil Attack, in which a malicious node illegitimately claims multiple identities. This Attack can exceedingly disrupt various operations of the mobile ad hoc networks such as data aggregation, voting, fair resource allocation scheme, misbehavior detection and routing mechanisms etc. Two routing mechanisms known to be vulnerable to the Sybil Attack in the mobile ad hoc networks are multi-path routing and geographic routing. In addition to these routing protocols, we show in this paper that the Sybil Attack can also disrupt the head selection mechanism of the lowest ID cluster-based routing protocol. To the best of our knowledge, this is for the first time that a Sybil Attack is shown to disrupt this cluster based routing protocol. To achieve this, we illustrate to have introduced a category of Sybil Attack in which the malicious node varies its transmission power to create a number of virtual illegitimate nodes called Sybil nodes, for the purpose of communication with legitimate nodes of the Mobile Ad Hoc Network. The variation in the transmission power makes the Sybil Attack more deadly and difficult to be detected.

Jiang Chao - One of the best experts on this subject based on the ideXlab platform.

  • Sybil Attack Detection Scheme Based on Wireless Sensor Networks
    Control and Instruments in Chemical Industry, 2010
    Co-Authors: Jiang Chao
    Abstract:

    Sybil Attack is a harmful threat which is difficulty to be detected in WSNs.To study Sybil Attack,a hierarchical grid-based scheme for Sybil Attack detection was proposed.According to the attribution of changing IDs of Sybil nodes,the Sybil Attack was detected by determining preliminary location based on hierarchical grid technique,furthermore,identities were certified by using key encryption technology in grid.The simulation results show that Sybil Attack can be detected effectively by this scheme.

  • Sybil Attack Detection Scheme Based on Hierarchical Grid
    Computer Engineering, 2010
    Co-Authors: Jiang Chao
    Abstract:

    Sybil Attack is a harmful threat which is difficult to be detected in Wireless Sensor Network(WSN),aiming at this problem,this paper presents Sybil Attack detection scheme based on a hierarchical grid. According to the versatility of Sybil node identity,it uses hierarchical grid technology preliminary determine physical location of Sybil Attack,uses key technology between grid nodes confirm Sybil node. Simulation results show that detection performance is high,memory utilization is low,and network extensible is strong of this scheme,it is fit for multi-hop transport in WSN.

Jingon Joung - One of the best experts on this subject based on the ideXlab platform.

  • a Sybil Attack detection scheme based on adas sensors for vehicular networks
    Consumer Communications and Networking Conference, 2020
    Co-Authors: Kiho Lim, Tariqul Islam, Hyunbum Kim, Jingon Joung
    Abstract:

    Vehicular Ad Hoc Network (VANET) is a promising technology for autonomous driving as it provides many benefits and user conveniences to improve road safety and driving comfort. Sybil Attack is one of the most serious threats in vehicular communications because Attackers can generate multiple forged identities to disseminate false messages to disrupt safety-related services or misuse the systems. To address this issue, we propose a Sybil Attack detection scheme using ADAS (Advanced Driving Assistant System) sensors installed on modern passenger vehicles, without the assistance of trusted third party authorities or infrastructure. Also, a deep learning based object detection technique is used to accurately identify nearby objects for Sybil Attack detection and the multi-step verification process minimizes the false positive of the detection.

Indranil Saha - One of the best experts on this subject based on the ideXlab platform.

  • Location verification based defense against Sybil Attack in sensor networks
    Lecture Notes in Computer Science, 2006
    Co-Authors: Debapriyay Mukhopadhyay, Indranil Saha
    Abstract:

    Security is a major concern for a large fraction of sensor network applications. Douceur first introduced the notion of Sybil Attack [4], where a single entity(node) illegitimately presents multiple identities. As the nodes in sensor networks can be physically captured by an adversary, Sybil Attack can manifest in a severe form leading to the malfunction of basic operational protocols including routing, resource allocation and misbehavior detection. In this study, we propose a location verification based defense against Sybil Attack for sensor network where we assume that the network is consisted of static sensor nodes. We report quantitatively about the probability of not being able to detect Sybil Attack. This probability is indicative of the usefulness of our proposed protocol.

  • ICDCN - Location verification based defense against Sybil Attack in sensor networks
    Distributed Computing and Networking, 2006
    Co-Authors: Debapriyay Mukhopadhyay, Indranil Saha
    Abstract:

    Security is a major concern for a large fraction of sensor network applications. Douceur first introduced the notion of Sybil Attack [4], where a single entity(node) illegitimately presents multiple identities. As the nodes in sensor networks can be physically captured by an adversary, Sybil Attack can manifest in a severe form leading to the malfunction of basic operational protocols including routing, resource allocation and misbehavior detection. In this study, we propose a location verification based defense against Sybil Attack for sensor network where we assume that the network is consisted of static sensor nodes. We report quantitatively about the probability of not being able to detect Sybil Attack. This probability is indicative of the usefulness of our proposed protocol.