Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc Network

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 131)

Abstract

It is cumbersome to achieve the security in a mobile ad hoc network due to its open nature, dynamically changing topology, lack of infrastructure and central management. A particular harmful attack that takes the advantage of these characteristics is the Sybil attack, in which a malicious node illegitimately claims multiple identities. Two routing mechanisms vulnerable to the Sybil attack in the mobile ad hoc networks are multi-path routing and geographic routing. In addition to these routing protocols, we show in this paper that the Sybil attack can also disrupt the head selection mechanism of various cluster-based routing protocols such as lowest id, highest node degree and mobility based clustering. To achieve this, we illustrate to have introduced a category of Sybil attack in which the malicious node varies its transmission power to create a number of virtual illegitimate nodes called Sybil Nodes, for the purpose of communication with legitimate nodes of the MANETs.

Keywords

Mobile ad hoc network Sybil attack Malicious node Sybil node Network security Routing protocol 

References

  1. 1.
    Wu B, Chen J, Wu J, Cardei M (2006) A survey on attacks and countermeasures in mobile ad hoc networks. In: Xiao Y, Shen X, Du D-Z (eds) Wireless/mobile network security. Springer, New York, pp 103–135Google Scholar
  2. 2.
    Al-Shurman M, Yoo S-M, Park S (2004) Black hole attack in mobile ad-hoc networks. In: ACM Southeast Regional conferenceGoogle Scholar
  3. 3.
    Hu YC, Perrig A, Johnson DB (2003) Rushing attacks and defense in wireless ad hoc networks routing protocol. In: Proceedings of ACM WiSe2003Google Scholar
  4. 4.
    Hu Y, Perrig A, Johnson D (2002) Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. In: Proceeding of IEEE INFORCOMGoogle Scholar
  5. 5.
    Douceur JR (2002) The Sybil attack. IPTPS ’01: revised papers from the first international workshop on peer-to-peer systems. Springer Verlag, London, UK, pp 251–260Google Scholar
  6. 6.
    Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Elsevier’s Ad Hoc Netw J Special Issue Sens Netw Appl Protoc 1(2–3):293–315CrossRefGoogle Scholar
  7. 7.
    Ephremides A, Wieselthier JE, Baker DJ (1987) A design concept for reliable mobile radio networks with frequency hopping signaling. Proc IEEE 75(1):56–73Google Scholar
  8. 8.
    Gerla M, Tsai JTC (1995) Multicluster, mobile, multimedia radio network. ACM/Baltzer Wirel Netw J 1:255–265Google Scholar
  9. 9.
    Basu P, Khan N, Little T (2001) A mobility based metric for clustering in mobile ad hoc networks. In: Proceedings of the 21st international conference on distributed computing systems workshops (ICDCSW ’01), pp 413–418Google Scholar
  10. 10.
    Lee S-J, Gerla M (2001) Split multipath routing with maximally disjoint paths in ad hoc networks. In: Proceedings of the IEEE international conference on communications (ICC). Helsinki, Finland, pp 3201–3205, June 2001Google Scholar
  11. 11.
    Karp B, Kung HT (2000) GPSR: greedy perimeter stateless routing for wireless networks. In: Proceedings of IEEE/ACM MobiCom, pp 243–254Google Scholar
  12. 12.
    Newsome J, Shi E, Song D, Perrig A (2004) The Sybil attack in sensor networks: analysis and defenses. In: Proceedings of the 3rd international symposium on information processing in sensor networks (IPSN ’04), ACM, Berkeley, California, USA, pp 259–268Google Scholar
  13. 13.
    Lee S-J, Gerla M, Chiang CC (1999) On-demand multicast routing protocol (ODMRP). In: Proceedings of IEEE WCN’99, Sep 1999Google Scholar
  14. 14.
    Royer EM, Perkins CE (1999) Multicast operation of ad hoc on-demand distance vector routing protocol. In: Proceedings of ACM MOBICOM, pp 207–18, August 1999Google Scholar
  15. 15.
    Basagni S, Chlmtac I, Syrotiuk VR, Woodward BA (1998) A distance routing effect algorithm for mobility (DREAM). In: Proceedings of IEEE/ACM MobiCom, pp 76–84Google Scholar
  16. 16.
    Ko Y, Vaidya NH (1998) Location-aided routing (LAR) in mobile ad hoc networks. In: Proceedings of IEEE/ACM MobiCom, pp 66–75Google Scholar
  17. 17.
    Johnson DB, Maltz DA (1996) Dynamic source routing in ad hoc wireless networks. In: Imielinski T, Korth H (eds) Mobile computing. Kulwer Academic Publishers, Boston, pp 153–181Google Scholar
  18. 18.
    Demirbas M, Song YW (2006) An RSSI-based scheme for Sybil attack detection in wireless sensor networks. In: International workshop on wireless mobile multimedia. New York, USA, pp 564–570Google Scholar
  19. 19.
    Ssu K-F, Wang W-T, Chang W-C (2009) Detecting Sybil attacks in wireless sensor networks using neighboring information. Comput Netw 53(18):3042–3056Google Scholar
  20. 20.
    Piro C, Shields C, Levine BN (2006) Detecting the Sybil attack in mobile ad hoc networks. In: Securecomm and workshopsGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.Department of Computer ScienceHimachal Pradesh UniversityShimlaIndia
  2. 2.Department of Computer Science and Engineering and Information TechnologyJaypee University of Information TechnologySolanIndia

Personalised recommendations