Collusion-Resistant Sybil Attack Detection Scheme in Mobile Ad hoc Networks

被引:0
作者
Khan, Muhammad Sajid [1 ]
Iltaf, Naima [1 ]
Rashdi, Adnan [1 ]
机构
[1] Natl Univ Sci & Technol, Islamabad, Pakistan
来源
2014 NATIONAL SOFTWARE ENGINEERING CONFERENCE (NSEC - 2014) | 2014年
关键词
Collusion Attack; Sybil Attack; Recommendation model; Malicious Recommendations;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
MANET is a collection of number of nodes that formulates; either, a temporary or permanent, self-organized wireless network that dont rely on any pivotal central architecture or control. They are designed to use in situations where infrastructure network is either non-existent or its extremely costly to deploy. MANETs require a distinctive, unique and insistent identity for each node for its security protocols to be effective; Sybil attacks present a grave threat to such networks. We can create large number of logical identities in a Sybil attack on a single physical device by a selfish malicious node which gives a false impression to the network that they are different benign nodes and uses them to launch a harmonized attack against the network or a node. Node cooperation is very important for detection of Sybil attack, but unfortunately nodes may not always behave cooperatively and may collude in hostile environments for disrupting the detection accuracy of such systems. Sybil nodes cannot be accurately detected in the presence of malicious collusion which results in serious impact on detection accuracy of Sybil attacks. This paper proposed a novel scheme in order to detect a Sybil attack resistant to collusion by incorporating a trust based mechanism that would mitigate the benefit (the payoff gained) from collusion. Experimental results show that our proposed scheme detects Sybil or whitewashers new identities accurately and reduces the benefits of collusion in the presence of mobility.
引用
收藏
页码:30 / 36
页数:7
相关论文
共 16 条
  • [1] [Anonymous], 2002, 1 INT WORKSH PEER TO
  • [2] [Anonymous], P EUR
  • [3] [Anonymous], 2006, 2006 INT S WORLD WIR
  • [4] [Anonymous], P 2006 WORKSH DEP IS
  • [5] [Anonymous], ALEUDCSTR1297 YAL U
  • [6] [Anonymous], WSEAS T COMMUNICATIO
  • [7] [Anonymous], 2004, the third international symposium on Information processing in sensor networks
  • [8] [Anonymous], IEEE SYSTEMS J
  • [9] [Anonymous], 2005, TECHNICAL REPORT U M
  • [10] [Anonymous], 2 INT C DEV ESYSTEMS