top of page

Simulation and Analysis of Sybil attack in MANET

References

[1] J. Newsome, E. Shi, D. Song and A. Perrig, "The Sybil attack in sensor networks: analysis & defenses," Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004, 2004, pp. 259-268.
doi: 10.1109/IPSN.2004.1307346

​

[2] G. Guette and B. Ducourthial, "On the Sybil attack detection in VANET," 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, Pisa, 2007, pp. 1-6.
doi: 10.1109/MOBHOC.2007.4428742

​

[3] C. Piro, C. Shields and B. N. Levine, "Detecting the Sybil Attack in Mobile Ad hoc Networks," 2006 Securecomm and Workshops, Baltimore, MD, 2006, pp. 1-11.
doi: 10.1109/SECCOMW.2006.359558

​

[4] Z. Kasiran and J. Mohamad, "Throughput performance analysis of the wormhole and sybil attack in AODV," 2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP), Bangkok, 2014, pp. 81-84.
doi: 10.1109/DICTAP.2014.6821661

​

[5] Yanchao Zhang, Wei Liu, Wenjing Lou and Yuguang Fang, "Location-based compromise-tolerant security mechanisms for wireless sensor networks," in IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 247-260, Feb. 2006.
doi: 10.1109/JSAC.2005.861382

Product
About

Abstract

Mobile Ad hoc Network(MANET) is a wireless connection of self configuring, infrastructure-less network of mobile devices. MANETs can be exploited with several cyber attack methods, compromising the security of the nodes within the network. Sybil attack is one of the serious threats when it comes to Wireless networks. The Attacker can make a node illegitimately claim multiple identities with identity theft, misleading other nodes by showing wrong/duplicate ID. The attack is named after a case study of a woman diagnosed with dissociative identity disorder. In this project simulation we will implement the sybil attack on Mobile Ad hoc Network and study its effects.

bottom of page