The Sybil attack in mobile adhoc network: analysis and detection

Security is one of the most challenging issues in Mobile Adhoc Network (MANET) due to the lack of centralized authority and limited resources. This paper discusses different types of security attacks in MANET and gives emphasis particularly on the Sybil attack which is one of the most harmful attack...

Full description

Saved in:
Bibliographic Details
Published inProceedings of third International Conference on Computational Intelligence and Information Technology pp. 458 - 466
Main Authors Sinha, S, Paul, A, Pal, S
Format Conference Proceeding
LanguageEnglish
Published Stevenage, UK IET 2013
The Institution of Engineering & Technology
Subjects
Online AccessGet full text
ISBN9781849198592
1849198594
DOI10.1049/cp.2013.2629

Cover

Abstract Security is one of the most challenging issues in Mobile Adhoc Network (MANET) due to the lack of centralized authority and limited resources. This paper discusses different types of security attacks in MANET and gives emphasis particularly on the Sybil attack which is one of the most harmful attacks. Taxonomy and threats of Sybil attacks in different environment are presented. Comparative analysis has been performed on several detection approaches to mitigate Sybil attack which provides efficiency, limitations and application domain of each of these approaches. This paper also introduces a new approach to detect Sybil attack based on clustering as well as resource testing.
AbstractList Security is one of the most challenging issues in Mobile Adhoc Network (MANET) due to the lack of centralized authority and limited resources. This paper discusses different types of security attacks in MANET and gives emphasis particularly on the Sybil attack which is one of the most harmful attacks. Taxonomy and threats of Sybil attacks in different environment are presented. Comparative analysis has been performed on several detection approaches to mitigate Sybil attack which provides efficiency, limitations and application domain of each of these approaches. This paper also introduces a new approach to detect Sybil attack based on clustering as well as resource testing.
Author Pal, S
Sinha, S
Paul, A
Author_xml – sequence: 1
  givenname: S
  surname: Sinha
  fullname: Sinha, S
  organization: Fac. of Comput. Sci., Pacific Acad. of Higher Educ. & Res. Univ., Udaipur
– sequence: 2
  givenname: A
  surname: Paul
  fullname: Paul, A
– sequence: 3
  givenname: S
  surname: Pal
  fullname: Pal, S
BookMark eNotkE1LAzEURQMqqLU7f0DApbTmJZnJPFeK-AUFF9Z1SJM3dNqa1EmK9N87pa7uu3B4XM4lO40pEmPXIKYgNN757VQKUFNZSzxhYzQNNBoBmwrlORvnvBJCANYINV6wh_mS-Od-0W24K8X5Ne8i_05DJ-7CMnkeqfymfn3PXXSbfe7ycAQeqJAvXYpX7Kx1m0zj_xyxr5fn-dPbZPbx-v70OJt0oHSZBNRVu9CmgiCl8642mmRjjCSBtXYBNBotULWka0KvHLgK5DB9IQK0mtSI3Rz_bvv0s6Nc7Crt-mFStmBMrZVslBqo2yPVUbE-xZZ6ip4GRtiDHeu39mDHHuyoPx6-WM0
ContentType Conference Proceeding
Copyright Copyright The Institution of Engineering & Technology Oct 18, 2013
Copyright_xml – notice: Copyright The Institution of Engineering & Technology Oct 18, 2013
DBID 8ET
8FE
8FG
ABJCF
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L6V
M7S
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
DOI 10.1049/cp.2013.2629
DatabaseName IET Conference Publications by volume
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
ProQuest Central Student
SciTech Premium Collection (Proquest)
ProQuest Computer Science Collection
Computer Science Database
ProQuest Engineering Collection
Engineering Database
Advanced Technologies & Aerospace Collection
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
DatabaseTitle Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Engineering Collection
Advanced Technologies & Aerospace Collection
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList Computer Science Database

Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EndPage 466
ExternalDocumentID 4002504991
10_1049_cp_2013_2629
GroupedDBID 6IE
6IK
8ET
AAJGR
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
OCL
RIE
8FE
8FG
AAWTH
ABJCF
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L6V
M7S
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
ID FETCH-LOGICAL-i134t-d945fb4751d22aca674e28772e0964ad14974093fe46e9c3a1a512818b0d1f4e3
IEDL.DBID BENPR
ISBN 9781849198592
1849198594
IngestDate Mon Jun 30 08:43:44 EDT 2025
Tue Jan 05 23:28:17 EST 2021
IsPeerReviewed false
IsScholarly false
Keywords telecommunication security
mobile adhoc network
MANET
security attack
pattern clustering
Sybil attack detection
mobile ad hoc networks
Sybil attack mitigation
resource testing
clustering analysis
Language English
LinkModel DirectLink
MeetingName Third International Conference on Computational Intelligence and Information Technology (CIIT 2013), 18-19 Oct. 2013, Mumbai, India
MergedId FETCHMERGED-LOGICAL-i134t-d945fb4751d22aca674e28772e0964ad14974093fe46e9c3a1a512818b0d1f4e3
Notes ObjectType-Article-1
ObjectType-Feature-2
SourceType-Conference Papers & Proceedings-1
content type line 22
PQID 1776432833
PQPubID 1936365
PageCount 9
ParticipantIDs proquest_journals_1776432833
iet_conferences_10_1049_cp_2013_2629
ProviderPackageCode 8ET
PublicationCentury 2000
PublicationDate 20130000
20131018
PublicationDateYYYYMMDD 2013-01-01
2013-10-18
PublicationDate_xml – year: 2013
  text: 20130000
PublicationDecade 2010
PublicationPlace Stevenage, UK
PublicationPlace_xml – name: Stevenage, UK
– name: Stevenage
PublicationTitle Proceedings of third International Conference on Computational Intelligence and Information Technology
PublicationYear 2013
Publisher IET
The Institution of Engineering & Technology
Publisher_xml – name: IET
– name: The Institution of Engineering & Technology
SSID ssj0001969169
Score 1.5778378
Snippet Security is one of the most challenging issues in Mobile Adhoc Network (MANET) due to the lack of centralized authority and limited resources. This paper...
SourceID proquest
iet
SourceType Aggregation Database
Publisher
StartPage 458
SubjectTerms Data security
Mobile radio systems
Title The Sybil attack in mobile adhoc network: analysis and detection
URI http://digital-library.theiet.org/content/conferences/10.1049/cp.2013.2629
https://www.proquest.com/docview/1776432833
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LS8NAEB76uHjyVbFayx56jW02m00iiKK0FsFS1EJvYV_BoiZV48F_72yapAfBW5aEQGayM_PtPD6AAZeUChP6DktC4TAluINOkDkJt7Tm4SiQBSXLw4xPF-x-6S8bMKt6YWxZZWUTC0OtM2XPyIduEKDzRGfoXa0_HMsaZbOrFYWGKKkV9GUxYqwJbWonY7WgfTOezR-3py4Rx3go2vSSRwi4_XI6YFivaVkej6HzUNmJlq53TrkNQZsrk_8x2YUfmuxBZ9uhR-a179mHhkkPYLeiaCDljj2Ea_wNyNOPXL0RkedCvZJVSt4zXBsi9EumSLqpA78gohxPgheaaJMXNVppBxaT8fPt1ClJE5yV67Hc0RHzE8kC39WoBZR9wAyiooAaBCtMaEREAWI6LzGMm0h5whW-zaaFcqTdhBnvCFpplppjIC6VGMAkkeYSQRzilCjxjNK-TKinuaZdGKBEYlV_-FdcpLRZFKt1bAUXW8F1oVeJLC43CD5Yq_Pk_9unsGPfZN2FG_aglX9-mzOMA3LZh2Y4ueuXKu4XrXu_Pd2uag
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTsMwEB2V9gAndrHjAxwDxHacBAmB2NSyVIhF4ha8RVRAyhKE-Dm-jXFwygGJW2-xYlnO2PHM8ywPYE0oSqVNooDniQy4liJAJciDXDha82QrVhUly3lXtG_4yW1024CvOhfGhVXWZ2J1UJu-dnfkm2Eco_JEZch2n18CxxrlvKs1hYb01Apmpyox5hM7Tu3nB0K4t53OIa73OqXHR9cH7cCzDAS9kPEyMCmPcsXjKDQ4bZxszC3CiJhatO65NAghYgRBLLdc2FQzGcrIuZ8StWXCnFuG445AizPs14TW_lH34vL3licVaH-lP7nrKQL8yFcjTAZt6sPx0VTf1K6CZsg2qHAm70jPln9URKX3jidg5jcjkFwMdN0kNGwxBeM1JQTxJ8Q07OG2I1efqvdIZFlK_UB6BXnqY9sSae77mhQ_cefbRPpyKPhgiLFlFRNWzMDNUMQ3C82iX9g5ICFVaDDlqREKQSPiojRnVptI5ZQZYeg8rKFEMj348LescqHzNNPPmRNc5gQ3D0u1yDL_Q2LHwfZZ-P_1Koy2r8_PsrNO93QRxtyoTlWFyRI0y9d3u4w2SKlW_EITuBv23voGNdjoLQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Third+International+Conference+on+Computational+Intelligence+and+Information+Technology+%28CIIT+2013%29&rft.atitle=The+Sybil+attack+in+mobile+adhoc+network%3A+analysis+and+detection&rft.au=Sinha%2C+S&rft.au=Paul%2C+A&rft.au=Pal%2C+S&rft.date=2013-01-01&rft.pub=IET&rft.isbn=9781849198592&rft.spage=458&rft.epage=466&rft_id=info:doi/10.1049%2Fcp.2013.2629&rft.externalDocID=10_1049_cp_2013_2629
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781849198592/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781849198592/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781849198592/sc.gif&client=summon&freeimage=true