The Sybil attack in mobile adhoc network: analysis and detection
Security is one of the most challenging issues in Mobile Adhoc Network (MANET) due to the lack of centralized authority and limited resources. This paper discusses different types of security attacks in MANET and gives emphasis particularly on the Sybil attack which is one of the most harmful attack...
Saved in:
| Published in | Proceedings of third International Conference on Computational Intelligence and Information Technology pp. 458 - 466 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
Stevenage, UK
IET
2013
The Institution of Engineering & Technology |
| Subjects | |
| Online Access | Get full text |
| ISBN | 9781849198592 1849198594 |
| DOI | 10.1049/cp.2013.2629 |
Cover
| Abstract | Security is one of the most challenging issues in Mobile Adhoc Network (MANET) due to the lack of centralized authority and limited resources. This paper discusses different types of security attacks in MANET and gives emphasis particularly on the Sybil attack which is one of the most harmful attacks. Taxonomy and threats of Sybil attacks in different environment are presented. Comparative analysis has been performed on several detection approaches to mitigate Sybil attack which provides efficiency, limitations and application domain of each of these approaches. This paper also introduces a new approach to detect Sybil attack based on clustering as well as resource testing. |
|---|---|
| AbstractList | Security is one of the most challenging issues in Mobile Adhoc Network (MANET) due to the lack of centralized authority and limited resources. This paper discusses different types of security attacks in MANET and gives emphasis particularly on the Sybil attack which is one of the most harmful attacks. Taxonomy and threats of Sybil attacks in different environment are presented. Comparative analysis has been performed on several detection approaches to mitigate Sybil attack which provides efficiency, limitations and application domain of each of these approaches. This paper also introduces a new approach to detect Sybil attack based on clustering as well as resource testing. |
| Author | Pal, S Sinha, S Paul, A |
| Author_xml | – sequence: 1 givenname: S surname: Sinha fullname: Sinha, S organization: Fac. of Comput. Sci., Pacific Acad. of Higher Educ. & Res. Univ., Udaipur – sequence: 2 givenname: A surname: Paul fullname: Paul, A – sequence: 3 givenname: S surname: Pal fullname: Pal, S |
| BookMark | eNotkE1LAzEURQMqqLU7f0DApbTmJZnJPFeK-AUFF9Z1SJM3dNqa1EmK9N87pa7uu3B4XM4lO40pEmPXIKYgNN757VQKUFNZSzxhYzQNNBoBmwrlORvnvBJCANYINV6wh_mS-Od-0W24K8X5Ne8i_05DJ-7CMnkeqfymfn3PXXSbfe7ycAQeqJAvXYpX7Kx1m0zj_xyxr5fn-dPbZPbx-v70OJt0oHSZBNRVu9CmgiCl8642mmRjjCSBtXYBNBotULWka0KvHLgK5DB9IQK0mtSI3Rz_bvv0s6Nc7Crt-mFStmBMrZVslBqo2yPVUbE-xZZ6ip4GRtiDHeu39mDHHuyoPx6-WM0 |
| ContentType | Conference Proceeding |
| Copyright | Copyright The Institution of Engineering & Technology Oct 18, 2013 |
| Copyright_xml | – notice: Copyright The Institution of Engineering & Technology Oct 18, 2013 |
| DBID | 8ET 8FE 8FG ABJCF AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L6V M7S P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS |
| DOI | 10.1049/cp.2013.2629 |
| DatabaseName | IET Conference Publications by volume ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection (Proquest) ProQuest Computer Science Collection Computer Science Database ProQuest Engineering Collection Engineering Database Advanced Technologies & Aerospace Collection ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection |
| DatabaseTitle | Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Engineering Collection Advanced Technologies & Aerospace Collection Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | Computer Science Database |
| Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EndPage | 466 |
| ExternalDocumentID | 4002504991 10_1049_cp_2013_2629 |
| GroupedDBID | 6IE 6IK 8ET AAJGR ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK OCL RIE 8FE 8FG AAWTH ABJCF AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L6V M7S P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS |
| ID | FETCH-LOGICAL-i134t-d945fb4751d22aca674e28772e0964ad14974093fe46e9c3a1a512818b0d1f4e3 |
| IEDL.DBID | BENPR |
| ISBN | 9781849198592 1849198594 |
| IngestDate | Mon Jun 30 08:43:44 EDT 2025 Tue Jan 05 23:28:17 EST 2021 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Keywords | telecommunication security mobile adhoc network MANET security attack pattern clustering Sybil attack detection mobile ad hoc networks Sybil attack mitigation resource testing clustering analysis |
| Language | English |
| LinkModel | DirectLink |
| MeetingName | Third International Conference on Computational Intelligence and Information Technology (CIIT 2013), 18-19 Oct. 2013, Mumbai, India |
| MergedId | FETCHMERGED-LOGICAL-i134t-d945fb4751d22aca674e28772e0964ad14974093fe46e9c3a1a512818b0d1f4e3 |
| Notes | ObjectType-Article-1 ObjectType-Feature-2 SourceType-Conference Papers & Proceedings-1 content type line 22 |
| PQID | 1776432833 |
| PQPubID | 1936365 |
| PageCount | 9 |
| ParticipantIDs | proquest_journals_1776432833 iet_conferences_10_1049_cp_2013_2629 |
| ProviderPackageCode | 8ET |
| PublicationCentury | 2000 |
| PublicationDate | 20130000 20131018 |
| PublicationDateYYYYMMDD | 2013-01-01 2013-10-18 |
| PublicationDate_xml | – year: 2013 text: 20130000 |
| PublicationDecade | 2010 |
| PublicationPlace | Stevenage, UK |
| PublicationPlace_xml | – name: Stevenage, UK – name: Stevenage |
| PublicationTitle | Proceedings of third International Conference on Computational Intelligence and Information Technology |
| PublicationYear | 2013 |
| Publisher | IET The Institution of Engineering & Technology |
| Publisher_xml | – name: IET – name: The Institution of Engineering & Technology |
| SSID | ssj0001969169 |
| Score | 1.5778378 |
| Snippet | Security is one of the most challenging issues in Mobile Adhoc Network (MANET) due to the lack of centralized authority and limited resources. This paper... |
| SourceID | proquest iet |
| SourceType | Aggregation Database Publisher |
| StartPage | 458 |
| SubjectTerms | Data security Mobile radio systems |
| Title | The Sybil attack in mobile adhoc network: analysis and detection |
| URI | http://digital-library.theiet.org/content/conferences/10.1049/cp.2013.2629 https://www.proquest.com/docview/1776432833 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LS8NAEB76uHjyVbFayx56jW02m00iiKK0FsFS1EJvYV_BoiZV48F_72yapAfBW5aEQGayM_PtPD6AAZeUChP6DktC4TAluINOkDkJt7Tm4SiQBSXLw4xPF-x-6S8bMKt6YWxZZWUTC0OtM2XPyIduEKDzRGfoXa0_HMsaZbOrFYWGKKkV9GUxYqwJbWonY7WgfTOezR-3py4Rx3go2vSSRwi4_XI6YFivaVkej6HzUNmJlq53TrkNQZsrk_8x2YUfmuxBZ9uhR-a179mHhkkPYLeiaCDljj2Ea_wNyNOPXL0RkedCvZJVSt4zXBsi9EumSLqpA78gohxPgheaaJMXNVppBxaT8fPt1ClJE5yV67Hc0RHzE8kC39WoBZR9wAyiooAaBCtMaEREAWI6LzGMm0h5whW-zaaFcqTdhBnvCFpplppjIC6VGMAkkeYSQRzilCjxjNK-TKinuaZdGKBEYlV_-FdcpLRZFKt1bAUXW8F1oVeJLC43CD5Yq_Pk_9unsGPfZN2FG_aglX9-mzOMA3LZh2Y4ueuXKu4XrXu_Pd2uag |
| linkProvider | ProQuest |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTsMwEB2V9gAndrHjAxwDxHacBAmB2NSyVIhF4ha8RVRAyhKE-Dm-jXFwygGJW2-xYlnO2PHM8ywPYE0oSqVNooDniQy4liJAJciDXDha82QrVhUly3lXtG_4yW1024CvOhfGhVXWZ2J1UJu-dnfkm2Eco_JEZch2n18CxxrlvKs1hYb01Apmpyox5hM7Tu3nB0K4t53OIa73OqXHR9cH7cCzDAS9kPEyMCmPcsXjKDQ4bZxszC3CiJhatO65NAghYgRBLLdc2FQzGcrIuZ8StWXCnFuG445AizPs14TW_lH34vL3licVaH-lP7nrKQL8yFcjTAZt6sPx0VTf1K6CZsg2qHAm70jPln9URKX3jidg5jcjkFwMdN0kNGwxBeM1JQTxJ8Q07OG2I1efqvdIZFlK_UB6BXnqY9sSae77mhQ_cefbRPpyKPhgiLFlFRNWzMDNUMQ3C82iX9g5ICFVaDDlqREKQSPiojRnVptI5ZQZYeg8rKFEMj348LescqHzNNPPmRNc5gQ3D0u1yDL_Q2LHwfZZ-P_1Koy2r8_PsrNO93QRxtyoTlWFyRI0y9d3u4w2SKlW_EITuBv23voGNdjoLQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Third+International+Conference+on+Computational+Intelligence+and+Information+Technology+%28CIIT+2013%29&rft.atitle=The+Sybil+attack+in+mobile+adhoc+network%3A+analysis+and+detection&rft.au=Sinha%2C+S&rft.au=Paul%2C+A&rft.au=Pal%2C+S&rft.date=2013-01-01&rft.pub=IET&rft.isbn=9781849198592&rft.spage=458&rft.epage=466&rft_id=info:doi/10.1049%2Fcp.2013.2629&rft.externalDocID=10_1049_cp_2013_2629 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781849198592/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781849198592/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781849198592/sc.gif&client=summon&freeimage=true |