DocumentCode
1783610
Title
Collusion-resistant Sybil attack detection scheme in mobile ad hoc networks
Author
Khan, M.S. ; Iltaf, Naima ; Rashdi, Adnan
Author_Institution
Nat. Univ. of Sci. & Technol. (NUST), Islamabad, Pakistan
fYear
2014
fDate
11-12 Nov. 2014
Firstpage
30
Lastpage
36
Abstract
MANET is a collection of number of nodes that formulates; either, a temporary or permanent, self-organized wireless network that dont rely on any pivotal central architecture or control. They are designed to use in situations where infrastructure network is either non-existent or its extremely costly to deploy. MANETs require a distinctive, unique and insistent identity for each node for its security protocols to be effective; Sybil attacks present a grave threat to such networks. We can create large number of logical identities in a Sybil attack on a single physical device by a selfish malicious node which gives a false impression to the network that they are different benign nodes and uses them to launch a harmonized attack against the network or a node. Node cooperation is very important for detection of Sybil attack, but unfortunately nodes may not always behave cooperatively and may collude in hostile environments for disrupting the detection accuracy of such systems. Sybil nodes cannot be accurately detected in the presence of malicious collusion which results in serious impact on detection accuracy of Sybil attacks. This paper proposed a novel scheme in order to detect a Sybil attack resistant to collusion by incorporating a trust based mechanism that would mitigate the benefit (the payoff gained) from collusion. Experimental results show that our proposed scheme detects Sybil or whitewashers new identities accurately and reduces the benefits of collusion in the presence of mobility.
Keywords
mobile ad hoc networks; protocols; telecommunication security; MANET; collusion resistant Sybil attack detection scheme; hostile environments; infrastructure network; malicious collusion; mobile ad hoc networks; node cooperation; security protocols; self-organized wireless network; selfish malicious node; single physical device; Hardware; Lead; Collusion Attack; Malicious Recommendations; Recommendation model; Sybil Attack;
fLanguage
English
Publisher
ieee
Conference_Titel
Software Engineering Conference (NSEC), 2014 National
Conference_Location
Rawalpindi
Print_ISBN
978-1-4799-6161-0
Type
conf
DOI
10.1109/NSEC.2014.6998237
Filename
6998237
Link To Document