Skip to main content

Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc Network

  • Conference paper
  • First Online:
Computer Networks & Communications (NetCom)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 131))

Abstract

It is cumbersome to achieve the security in a mobile ad hoc network due to its open nature, dynamically changing topology, lack of infrastructure and central management. A particular harmful attack that takes the advantage of these characteristics is the Sybil attack, in which a malicious node illegitimately claims multiple identities. Two routing mechanisms vulnerable to the Sybil attack in the mobile ad hoc networks are multi-path routing and geographic routing. In addition to these routing protocols, we show in this paper that the Sybil attack can also disrupt the head selection mechanism of various cluster-based routing protocols such as lowest id, highest node degree and mobility based clustering. To achieve this, we illustrate to have introduced a category of Sybil attack in which the malicious node varies its transmission power to create a number of virtual illegitimate nodes called Sybil Nodes, for the purpose of communication with legitimate nodes of the MANETs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wu B, Chen J, Wu J, Cardei M (2006) A survey on attacks and countermeasures in mobile ad hoc networks. In: Xiao Y, Shen X, Du D-Z (eds) Wireless/mobile network security. Springer, New York, pp 103–135

    Google Scholar 

  2. Al-Shurman M, Yoo S-M, Park S (2004) Black hole attack in mobile ad-hoc networks. In: ACM Southeast Regional conference

    Google Scholar 

  3. Hu YC, Perrig A, Johnson DB (2003) Rushing attacks and defense in wireless ad hoc networks routing protocol. In: Proceedings of ACM WiSe2003

    Google Scholar 

  4. Hu Y, Perrig A, Johnson D (2002) Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. In: Proceeding of IEEE INFORCOM

    Google Scholar 

  5. Douceur JR (2002) The Sybil attack. IPTPS ’01: revised papers from the first international workshop on peer-to-peer systems. Springer Verlag, London, UK, pp 251–260

    Google Scholar 

  6. Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Elsevier’s Ad Hoc Netw J Special Issue Sens Netw Appl Protoc 1(2–3):293–315

    Article  Google Scholar 

  7. Ephremides A, Wieselthier JE, Baker DJ (1987) A design concept for reliable mobile radio networks with frequency hopping signaling. Proc IEEE 75(1):56–73

    Google Scholar 

  8. Gerla M, Tsai JTC (1995) Multicluster, mobile, multimedia radio network. ACM/Baltzer Wirel Netw J 1:255–265

    Google Scholar 

  9. Basu P, Khan N, Little T (2001) A mobility based metric for clustering in mobile ad hoc networks. In: Proceedings of the 21st international conference on distributed computing systems workshops (ICDCSW ’01), pp 413–418

    Google Scholar 

  10. Lee S-J, Gerla M (2001) Split multipath routing with maximally disjoint paths in ad hoc networks. In: Proceedings of the IEEE international conference on communications (ICC). Helsinki, Finland, pp 3201–3205, June 2001

    Google Scholar 

  11. Karp B, Kung HT (2000) GPSR: greedy perimeter stateless routing for wireless networks. In: Proceedings of IEEE/ACM MobiCom, pp 243–254

    Google Scholar 

  12. Newsome J, Shi E, Song D, Perrig A (2004) The Sybil attack in sensor networks: analysis and defenses. In: Proceedings of the 3rd international symposium on information processing in sensor networks (IPSN ’04), ACM, Berkeley, California, USA, pp 259–268

    Google Scholar 

  13. Lee S-J, Gerla M, Chiang CC (1999) On-demand multicast routing protocol (ODMRP). In: Proceedings of IEEE WCN’99, Sep 1999

    Google Scholar 

  14. Royer EM, Perkins CE (1999) Multicast operation of ad hoc on-demand distance vector routing protocol. In: Proceedings of ACM MOBICOM, pp 207–18, August 1999

    Google Scholar 

  15. Basagni S, Chlmtac I, Syrotiuk VR, Woodward BA (1998) A distance routing effect algorithm for mobility (DREAM). In: Proceedings of IEEE/ACM MobiCom, pp 76–84

    Google Scholar 

  16. Ko Y, Vaidya NH (1998) Location-aided routing (LAR) in mobile ad hoc networks. In: Proceedings of IEEE/ACM MobiCom, pp 66–75

    Google Scholar 

  17. Johnson DB, Maltz DA (1996) Dynamic source routing in ad hoc wireless networks. In: Imielinski T, Korth H (eds) Mobile computing. Kulwer Academic Publishers, Boston, pp 153–181

    Google Scholar 

  18. Demirbas M, Song YW (2006) An RSSI-based scheme for Sybil attack detection in wireless sensor networks. In: International workshop on wireless mobile multimedia. New York, USA, pp 564–570

    Google Scholar 

  19. Ssu K-F, Wang W-T, Chang W-C (2009) Detecting Sybil attacks in wireless sensor networks using neighboring information. Comput Netw 53(18):3042–3056

    Google Scholar 

  20. Piro C, Shields C, Levine BN (2006) Detecting the Sybil attack in mobile ad hoc networks. In: Securecomm and workshops

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amol Vasudeva .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Sood, M., Vasudeva, A. (2013). Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc Network. In: Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Computer Networks & Communications (NetCom). Lecture Notes in Electrical Engineering, vol 131. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6154-8_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-6154-8_1

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-6153-1

  • Online ISBN: 978-1-4614-6154-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics