2012
DOI: 10.24297/ijct.v11i10.2974
|View full text |Cite
|
Sign up to set email alerts
|

Prevention Techniques for Sybil Attack

Abstract: Mobile ad-hoc network is a self-governing network, consists of group of nodes that communicates with each other through wireless links. As it is a wireless network, so it is subjected to various attacks. There is one attack which is very dangerous called Sybil attack. In Sybil attack, attackers or malicious nodes uses multiple identities to disrupt the communication between the nodes by capturing necessary and important information and creating misunderstandings between the nodes. In this paper some measures a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…They are most important and most common attacks on reputation systems; they consist in having a malicious node behaving as if it were a larger number of nodes, i.e., by impersonating other nodes or simply by claiming false identities [31]. The attacker can then generate an arbitrary number of additional node identities within the network with the use of a single physical device [32]; to compromise the reputation system established within the network and gain the majority of influence over it, by performing illegal actions (in relation to the rules and laws established in the network). This can be prevented with a good matching engine and general cybersecurity mechanisms to ensure a good operation.…”
Section: Various Challengesmentioning
confidence: 99%
“…They are most important and most common attacks on reputation systems; they consist in having a malicious node behaving as if it were a larger number of nodes, i.e., by impersonating other nodes or simply by claiming false identities [31]. The attacker can then generate an arbitrary number of additional node identities within the network with the use of a single physical device [32]; to compromise the reputation system established within the network and gain the majority of influence over it, by performing illegal actions (in relation to the rules and laws established in the network). This can be prevented with a good matching engine and general cybersecurity mechanisms to ensure a good operation.…”
Section: Various Challengesmentioning
confidence: 99%
“…The similarity of the node's path is checked by their overlapping components that how much they are overlapped. The similarity of the path is checked [3].…”
Section: Existing Workmentioning
confidence: 99%