Skip to main content

Sybil Secure Architecture for Multicast Routing Protocols for MANETs

  • Conference paper
Advances in Computing and Communications (ACC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 190))

Included in the following conference series:

  • 1738 Accesses

Abstract

The Sybil attack is a particularly harmful threat to mobile ad hoc networks where a single node illegitimately claims multiple identities. A malicious node may generate an arbitrary number of additional node identities using only one physical device thereby disrupting the normal functioning of the network. In this paper, a certificate based localized authentication scheme is proposed to prevent Sybil attack. Simulation results show that the proposed method can sustain the Sybil attack and protect the system throughput and hence the performance of the network to a considerable extent.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Levine, B.N., Shields, C., Boris Margolin, N.: A Survey of Solutions to the Sybil Attack, Tech report 2006-052, University of Massachusetts Amherst, Amherst, MA (2006)

    Google Scholar 

  2. Dinger, J., Hartenstein, H.: Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self-Registration. In: Proceedings of the First International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, pp. 756–763 (2006)

    Google Scholar 

  3. Douceur, J.: The Sybil Attack. In: Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), pp. 251–260 (2002)

    Google Scholar 

  4. Hashmi, S., Brooke, J.: Authentication Mechanisms for mobile ad hoc networks and resistance to Sybil attack. Secureware, 120–126 (2008)

    Google Scholar 

  5. Mary Anita, E.A., Vasudevan, V.: Prevention of Black Hole Attack in Multicast Routing Protocols for Mobile Ad-Hoc Networks Using a Self-Organized Public Key Infrastructure. Information Security Journal: A Global Perspective 18(5), 248–256 (2009)

    Google Scholar 

  6. Pal, S., Mukhopadhyay, A.K., Bhattacharya, P.P.: Defending Mechanisms against Sybil attack in Next Generation Mobile Ad Hoc Networks. IETE Technical Review 25(4), 209–215 (2008)

    Article  Google Scholar 

  7. Yi, S., Kravets, R.: Composite Key Management for ad Hoc Networks. In: Proc. of the first annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), pp. 52–61 (2004)

    Google Scholar 

  8. Yu, H., Kaminsky, M., Gibbons, P.H., Flaxman, A.: SybilGuard: Defending Against Sybil Attacks via Social Networks. In: Proceedings of ACM SIGCOMM Computer Communication Review, pp. 267–278. ACM Press, New York (2006)

    Google Scholar 

  9. Su, Z., Lin, C., Ren, F., Zhan, X.: Security mechanisms Analysis of Wireless Sensor Networks specific Routing Attacks. In: First International Symposium on Pervasive Computing and Applications, pp. 579–584 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Anita, E.A.M. (2011). Sybil Secure Architecture for Multicast Routing Protocols for MANETs. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 190. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22709-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22709-7_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22708-0

  • Online ISBN: 978-3-642-22709-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics