Prevention Techniques for Sybil Attack

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 11, Issue 10

Abstract

Mobile ad-hoc network is a self-governing network, consists of group of nodes that communicates with each other through wireless links. As it is a wireless network, so it is subjected to various attacks. There is one attack which is very dangerous called Sybil attack. In Sybil attack, attackers or malicious nodes uses multiple identities to disrupt the communication between the nodes by capturing necessary and important information and creating misunderstandings between the nodes. In this paper some measures are described to prevent Sybil attack.

Authors and Affiliations

Roopali Garg, Himika Sharma

Keywords

Related Articles

Optimal Parallelization Of Loop Structures

This paper is intended to be a follow up of the work done by the authors in previous articles. On one hand it is concluded with a theorem that proves to be a definite answer to one very important research direction and o...

WATERMARKING TECHNIQUES

Embedding a hidden stream of bits in a file is called Digital watermarking. The file could be an image, audio, video or text. Nowadays, a digital watermarking has many applications such as broadcast monitoring, owner ide...

Ontology Mapping using Fuzzy Decision Tree and Formal Concept Analysis

An ontology describes and defines the terms used to describe and represent an area of knowledge. Different people or organizations come up with their own ontology; having their own view of the domain. So, for systems to...

EFFICIENT DESIGN OF STORAGE AND RETRIEVAL METHODS

The paper demonstrates the viability of a number of storage techniques such as hashing using multilingual texts. The empirical studies of hashing techniques based on multilingual provide researchers with insight informat...

Visualizing text similarities from a graph-based SOM

Text in articles is based on expert opinion of a large number of people including the views of authors. These views are based on cultural or community aspects, which make extracting information from text very difficult....

Download PDF file
  • EP ID EP650361
  • DOI 10.24297/ijct.v11i10.2974
  • Views 55
  • Downloads 0

How To Cite

Roopali Garg, Himika Sharma (2013). Prevention Techniques for Sybil Attack. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 11(10), 3060-3064. https://europub.co.uk/articles/-A-650361