Detecting the Sybil Attack in Wireless Sensor Network :Survey
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 1
Abstract
Mobility is frequently a problem for providing security services in ad hoc networks. In this paper, we render that mobility can alsobe used to enhance security. Specifically, we render that nodes which are in  passively monitor traffic in the network can able to detect a Sybil attacker which uses a number of network identities simultaneously. We can do through simulation that this detection can be done by a single node, or multiple trusted nodes can join to improve the accuracy of detection. We then show that although the detection mechanism will falsely identify groups of nodes traveling together as a Sybil attacker, we can extend the protocol to monitor collisions at the MAC level to differentiate between a single attacker spoofing many addresses and a group of nodes traveling in close proximity.
Authors and Affiliations
A. V Pramod, Md. Abdul Azeem, M. Om Prakash
Secure and Distributed On-Demand Randomized Routing in WSN
Security and energy efficiency is of paramount importance in a wireless sensor network. This is due to their vulnerabledeployment conditions and battery based power. This paper presents a secure and distributed algorithm...
Investigating the Synergistic Relationship between Enterprise Resource Planning and Business Intelligence
This study aims to discuss the synergistic relationship between enterprise resource planning (ERP) and business intelligence (BI). It focuses on the benefits obtained from ERP and BI framework integration. The purpose of...
Validation of DeLone and McLean model to analyze decision support systems success in the banking sector of Oman
The main objective of this paper is to investigate empirically the validity of DeLone and McLean model in measuring the decision support system success in the banking sector of Oman. Data was collected from decision supp...
Microfinance as Employment Generation Tool (Case Study of Pakistan 2001-02 to 2010-11)
The objective of this study is to know the contributions of Micro finance towards employment development through generating employment opportunities to the alit class of urban and rural community. For this purpose quanti...
IMPLEMENTING A NEW ALGORITHM FOR ANALYSIS OF PROTOCOL EFFICIENCY USING STABILITY AND DELAY TRADEOFF IN MANET
In this paper, we present an extensive ns-2.33 simulation basedperformance comparison of four widely known stability-orientedon-demand Mobile Adhoc Network (MANET) routingprotocols. Our simulations show that modified Pow...