Abstract
The Sybil attack is a particularly harmful threat to mobile ad hoc networks where a single node illegitimately claims multiple identities. A malicious node may generate an arbitrary number of additional node identities using only one physical device thereby disrupting the normal functioning of the network. In this paper, a certificate based localized authentication scheme is proposed to prevent Sybil attack. Simulation results show that the proposed method can sustain the Sybil attack and protect the system throughput and hence the performance of the network to a considerable extent.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Levine, B.N., Shields, C., Boris Margolin, N.: A Survey of Solutions to the Sybil Attack, Tech report 2006-052, University of Massachusetts Amherst, Amherst, MA (2006)
Dinger, J., Hartenstein, H.: Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self-Registration. In: Proceedings of the First International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, pp. 756–763 (2006)
Douceur, J.: The Sybil Attack. In: Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), pp. 251–260 (2002)
Hashmi, S., Brooke, J.: Authentication Mechanisms for mobile ad hoc networks and resistance to Sybil attack. Secureware, 120–126 (2008)
Mary Anita, E.A., Vasudevan, V.: Prevention of Black Hole Attack in Multicast Routing Protocols for Mobile Ad-Hoc Networks Using a Self-Organized Public Key Infrastructure. Information Security Journal: A Global Perspective 18(5), 248–256 (2009)
Pal, S., Mukhopadhyay, A.K., Bhattacharya, P.P.: Defending Mechanisms against Sybil attack in Next Generation Mobile Ad Hoc Networks. IETE Technical Review 25(4), 209–215 (2008)
Yi, S., Kravets, R.: Composite Key Management for ad Hoc Networks. In: Proc. of the first annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), pp. 52–61 (2004)
Yu, H., Kaminsky, M., Gibbons, P.H., Flaxman, A.: SybilGuard: Defending Against Sybil Attacks via Social Networks. In: Proceedings of ACM SIGCOMM Computer Communication Review, pp. 267–278. ACM Press, New York (2006)
Su, Z., Lin, C., Ren, F., Zhan, X.: Security mechanisms Analysis of Wireless Sensor Networks specific Routing Attacks. In: First International Symposium on Pervasive Computing and Applications, pp. 579–584 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Anita, E.A.M. (2011). Sybil Secure Architecture for Multicast Routing Protocols for MANETs. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 190. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22709-7_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-22709-7_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22708-0
Online ISBN: 978-3-642-22709-7
eBook Packages: Computer ScienceComputer Science (R0)