Perspectives of Sybil attack in routing protocols of mobile ad hoc network

11Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

It is cumbersome to achieve the security in a mobile ad hoc network due to its open nature, dynamically changing topology, lack of infrastructure and central management. A particular harmful attack that takes the advantage of these characteristics is the Sybil attack, in which a malicious node illegitimately claims multiple identities. Two routing mechanisms vulnerable to the Sybil attack in the mobile ad hoc networks are multi-path routing and geographic routing. In addition to these routing protocols, we show in this paper that the Sybil attack can also disrupt the head selection mechanism of various cluster-based routing protocols such as lowest id, highest node degree and mobility based clustering. To achieve this, we illustrate to have introduced a category of Sybil attack in which the malicious node varies its transmission power to create a number of virtual illegitimate nodes called Sybil Nodes, for the purpose of communication with legitimate nodes of the MANETs. © 2013 Springer Science+Business Media.

Cite

CITATION STYLE

APA

Sood, M., & Vasudeva, A. (2013). Perspectives of Sybil attack in routing protocols of mobile ad hoc network. In Lecture Notes in Electrical Engineering (Vol. 131 LNEE, pp. 3–13). https://doi.org/10.1007/978-1-4614-6154-8_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free