ABSTRACT
Mobile Ad hoc Network (MANET) is a group of self-directed, self-organizing and freely moving mobile nodes connected through wireless links, without the support of any central infrastructure. In MANET, every node has a freedom to cooperate in data packet forwarding. MANET is susceptible to various kinds of routing attacks because of its dynamicity, mobility, open medium, and lack of central administration. Thus, security in MANET routing protocol is a vital issue and needs a mechanism to protect communication between nodes. In MANET, a protrusive attack which reduces the network performance is Sybil attack which theft the identities of genuine nodes and impersonate them and drops the packets. In this Paper, Sybil attack detection and prevention (SDP) mechanism is proposed which works as an intrusion detection and prevention system to detect and prevent the MANET against Sybil attack. The proposed SDP mechanism used historical profile analysis and blocking based mechanism that check the real-time as well as previous history of nodes to watch the behavior of Sybil node. Two scenarios of SDP mechanism have been implemented in NS-2 and evaluated with packet delivery ratio, normal routing load, delay and throughput. Accuracy of detection is checked with confusion matrix analysis and found that proposed system gives 90.7% and 97.85% true positive ratio in SDP-I and SDP-II scenarios respectively.
- Nema, A., Tiwari, B. and Tiwari, V., 2016, March. Improving accuracy for intrusion detection through layered approach using support vector machine with feature reduction. In Proceedings of the ACM Symposium on Women in Research 2016 (pp. 26--31.Google Scholar
- Saha, P. and Nath, A., 2016. An Overview on Mobile Ad-Hoc Networks. International Journal of Multidisciplinary Research and Modern Education (IJMRME), ISSN, pp.2454--6119.Google Scholar
- Douceur, J.R., 2002, March. The sybil attack. In International workshop on peer-to-peer systems (pp. 251--260. Springer, Berlin, Heidelberg.Google ScholarCross Ref
- Parno, B. and Perrig, A., 2005, November. Challenges in securing vehicular networks. In Workshop on hot topics in networks (HotNets-IV) (pp. 1--6.Google Scholar
- Hoeper, K. and Gong, G., 2007. Bootstrapping security in mobile ad hoc networks using identity-based schemes. In Security in Distributed and Networking Systems (pp. 313--337.Google Scholar
- Hashmi, S. and Brooke, J., 2010, July. Towards sybil resistant authentication in mobile ad hoc networks. In 2010 Fourth international conference on emerging security information, systems and technologies (pp. 17--24. IEEE.Google Scholar
- Chen, Y., Yang, J., Trappe, W. and Martin, R.P., 2010. Detecting and localizing identity-based attacks in wireless and sensor networks. IEEE Transactions on Vehicular Technology, 59(5), pp.2418--2434.Google ScholarCross Ref
- Bouassida, M.S., Guette, G., Shawky, M. and Ducourthial, B., 2009. Sybil Nodes Detection Based on Received Signal Strength Variations within VANET. Int. J. Netw. Secur., 9(1), pp.22--33.Google Scholar
- Pu, C., 2020. Sybil attack in RPL-based internet of things: analysis and defenses. IEEE Internet of Things Journal, 7(6), pp.4937--4949.Google ScholarCross Ref
- Rajadurai, H. and Gandhi, U.D., 2020. Fuzzy based collaborative verification system for Sybil attack detection in MANET. Wireless Personal Communications, 110(4), pp.2179--2193.Google ScholarDigital Library
- Akasapu, A. K., Thangavel, G., &Pulugurtha, K. S. R., 2020. An Approach to Identify the Sybil Attacks in Vehicular Ad-Hoc Networks Using Path Signature. International journal of scientific & technology research, volume 9, issue 03, march 2020Google Scholar
- Sastry, A.S., Chitlapalli, S.S. and Akhila, S., 2019, February. Work-in-Progress: A Novel Approach to Detection and Avoid Sybil Attack in MANET. In International Conference on Remote Engineering and Virtual Instrumentation (pp. 429--441. Springer, Cham.Google Scholar
- Yuan, Y., Huo, L., Wang, Z. and Hogrefe, D., 2018. Secure APIT localization scheme against sybil attacks in distributed wireless sensor networks. IEEE Access, 6, pp.27629--27636.Google ScholarCross Ref
- Mishra, A.K., Tripathy, A.K., Puthal, D. and Yang, L.T., 2018. Analytical model for sybil attack phases in internet of things. IEEE Internet of Things Journal, 6(1), pp.379--387.Google ScholarCross Ref
- Dejene, D., Tiwari, B. and Tiwari, V., 2020. TD2SecIoT: Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT. International Journal of Interactive Multimedia & Artificial Intelligence, 6(4).Google Scholar
- Khalil, M. and Azer, M.A., 2018, April. Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks. In 2018 Wireless Days (WD) (pp. 184--186. IEEE.Google Scholar
- Kumari, R. and Dutta, M., 2018, December. Efficient Approaches to Mitigate the Effect of Sybil Attack in MANET for High Network Lifetime: A review. In 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC) (pp. 557--562. IEEE.Google Scholar
- Chauhan, D.S. and Bakshi, S., 2018. Mitigation of Sybil attack in MANET using GA with Fuzzy Logic. Management, 3(4)., pp. 12--19. 2018.Google Scholar
- Yadav, S., Tiwari, V. and Tiwari, B., 2016, March. Privacy preserving data mining with abridge time using vertical partition decision tree. In Proceedings of the ACM Symposium on Women in Research 2016 (pp. 158--164.Google Scholar
Index Terms
- An Intrusion Prevention System embedded AODV to protect Mobile Adhoc Network against Sybil Attack
Recommendations
AODV and SAODV under Attack: Performance Comparison
ADHOC-NOW 2014: Proceedings of the 13th International Conference on Ad-hoc, Mobile, and Wireless Networks - Volume 8487AODV is a reactive MANET routing protocol that does not support security of routing messages. SAODV is an extension of the AODV routing protocol that is designed to fulfil security features of the routing messages. In this paper, we study the ...
Implementation and Analysis of Blackhole Attack in AODV Routing Protocol
ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive StrategiesMANET (Mobile ad-hoc network) is a wireless network. Several mobile nodes are present in MANET. It has various applications ranging from military to remote area communication. Several routing protocols are designed for routing of the packets in the ...
Performance Analysis of AODV, OLSR, DSDV Routing Protocols in MANET Under Black Hole Attack
ICCA 2020: Proceedings of the International Conference on Computing AdvancementsPresently Mobile ad hoc network (MANET) is going more exoteric for its wireless structure, and its demand is increasing day by day. MANET is basically used in such type of application where the infrastructure of a cable connection is limited and ...
Comments