SlideShare a Scribd company logo
International Journal of Modern Trends in Engineering and
Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 161
DETECTION OF SYBIL ATTACK USING POSITION
VERIFICATION METHOD IN MANETS
Ch. Niranjan Kumar1
, N.Satyanarayana2
1
CSE, Sumathi Reddy Institute of Technology for women, Telangana
2
Professor, Dept. of CSE, Nagole Institute of Technology and Science, Hyderabad
Abstract— Compared to wired networks, Ad hoc networks are more vulnerable to security attacks
due to the lack of trusted centralized authority, lack of trust relationships between nodes. This paper
focuses on Sybil attack and its detection. A malicious node can generate and control a large number
of logical identities on a single device. This gives the illusion to network as these are different
legitimate nodes. An algorithm is proposed using position verification to detect the Sybil attack. The
algorithm is implemented in Network Simulator and the throughput, and packet delivery ratio with
and without Sybil attack.
Keywords- Sybil attack; AOMDV; wireless ad hoc networks; position verification and NS2.
I. INTRODUCTION
Wireless ad-hoc networks are composed of autonomous nodes that are self managed without any
infrastructure. Ad-hoc networks have a dynamic topology such that nodes can easily join or leave the
network at any time. Ad-hoc networks have a dynamic topology such that nodes can easily join or
leave the network at any time. Since the nodes communicate with each other without an
infrastructure, they provide the connectivity by forwarding packets over themselves. To support this
connectivity, nodes use some routing protocols such as AOMDV (Ad-hoc On-Demand multipath
Distance Vector), AODV, DSR (Dynamic Source Routing) and DSDV (Destination-Sequenced
Distance-Vector). Besides acting as a host, each node also acts as a router to discover a path and
forward packets to the correct node in the network.
Compared to wired networks, Ad-hoc networks are more vulnerable to security attacks due to the
lack of trusted centralized authority, lack of trust relationships between nodes, easy eavesdropping,
dynamic network topology, low bandwidth, battery and memory constraints of the devices. The
attacks can be of many types where protocol compliant attack called Sybil attack is one of the most
difficult attacks to detect.
II. ADHOC NETWORK FEATURES
Ad-hoc networks are best suited for use in situations where an infrastructure is unavailable or to
deploy one is not cost effective [8]. The initial development of Ad-hoc networks was primarily
driven by military applications where rapid network formation and survivability are key
requirements. On the other hand, distributed network architecture with all nodes having equal
responsibility and using broadcast radio is ideally suited to the military requirements. To overcome
the limited radio transmission ranges (i.e. Not all nodes are within the range of every other node)
nodes are equipped with the ability to forward information on behalf of others i.e. multi-hop
communications. Combined with packet switching technology and suitable medium access control
protocols, multi-hop communication provides the basis for resilient, large-scale military ad-hoc
networks.
• Independence from central network administration
• Self-configuring, nodes are also routers
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 162
• Self-healing through continuous re-configuration
• Scalable: Accommodates the addition of more nodes
• Flexible: Similar to being able to access the Internet from many different locations.
III. ATTACKS ON WIRELESS ADHOC NETWORKS
Malicious and selfish nodes are the ones that fabricate attacks against physical, data link, net
work, and application-layer functionality as shown in Table 1. Current routing protocols are
exposed to active and passive attacks [1].
Active attacks: In an active attack, information is inserted into the network and thus the network
operation or some nodes may be harmed. Through which the
misbehaving node has to bear some energy costs in order to perform some harmful operation and
nodes that perform active attacks with the aim of damaging other nodes by causing network outage
are considered to be malicious.
Passive Attacks: A passive attack does not disrupt the normal operation of the network. The attacker
snoops the data exchanged in the network without altering it. Here, the requirement of confidentiality
gets violated. Detection of a passive attack is very difficult for the operation of the network itself
doesn’t get affected. One of the solutions to the problem is to use powerful encryption mechanism to
encrypt the data being transmitted.
Table 1. Types of Attacks
IV. SYBIL ATTACK
Malicious nodes in a network may not only impersonate one node, they could assume the identity of
several nodes by doing so undermining the redundancy of many routing protocols. This attack is
called the Sybil attack.
Since ad-hoc networks depend on the communication between nodes, many systems apply
redundant algorithms to ensure that the data gets from point A to point B. A consequence of this is
that attackers have a harder time to destroy the integrity of information. If the same packet is sent
over several distinct paths a change in the packets incoming from one of these paths can be detected
easily. Thus, isolating a possible intruder in the network becomes possible. Also, if not the same
packet but pieces of related information is sent on distinct routes, an eavesdropper might have
difficulties putting together the pieces of the information puzzle.
However, if a single malicious node is able to represent several other nodes, the effectiveness of
these measures is significantly degraded. The attacker may get access to all pieces of the fragmented
information or may alter all packets in the same transmission, so that the destination node cannot
detect tampering anymore. In a trust-based routing environment, representing multiple identities can
be abused to deliver fake recommendations about the trustworthiness of a certain party, hereby
attracting more traffic to it in ideal starting point for further attack.
Application
layer
Repudiation, malicious code
Transport layer
Session hijacking, SYN
flooding
Network layer
Wormhole, Black hole, Gray
hole, flooding, Sybil attack
Data link layer Traffic analysis, monitoring
Physical layer Jamming, eavesdropping
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 163
Figure 1. Sybil Attack
Sybil attack is more severe attack, in which attacker disrupts both network topology and multi-path
routing protocol functionality. To disturb network topology, adversary often changes the locations
with different legitimate node ids. To disturb multi-path routing, the attacker appears with multiple
identities in the network, which are taken from the compromised node and appearing in most of the
node disjoint paths. Figure 1. Shows the Sybil attack. In this scenario, malicious node X has three
identities M1, M2 and M3 and all these identities are spoofed in passive mode. A and F are source
and destination nodes need to have multipath between them. Here, malicious node will appear in all
multiple paths with different identities such as (A,C,D,M1,F),(A,B,G,M2,F) and (A,B,G,H,I,M3,F).
4.1. Sybil attack on protocols
In Sybil attack, a Sybil node illegitimately claims multiple identities. A Sybil node can generate and
control a large number of logical identities on a single physical device. This gives the illusion to the
network as if it were different legitimate nodes[3]. It can affect following protocols.
A. Distributed Storage A Sybil attack can disrupt the architecture where data is usually replicated or
fragmented on several nodes such as where distributed hash tables are used because in reality data
will be stored on Sybil identities generated by the same malicious node.
B. A routing Routing mechanism in which the nodes are supposed to be disjoint is affected by
Sybil identities because one node will be present in the various paths and different locations
at the same time.
C. Data aggregation In a sensor network due to the lack of resources, data is often aggregated to one
node. A Sybil node can change the whole aggregation reading outcome by contributing many times
as a different user.
D. Voting Most often in ad hoc and peer-to-peer networks a decision is made using voting where a
Sybil node can control the result by rigging the polling process using multiple virtual identities.
E. Misbehavior Detection In misbehavior detection schemes a Sybil node can increase its reputation,
credit, or trust, value and can decrease the same value of the other legitimate nodes by exploiting its
virtual identities. Eventually, it can diminish the detection accuracy of an intrusion detection system.
F. Traffic Congestion in a Vehicular Ad hoc Network (VANET) A malicious attacker can create the
illusion of traffic congestion by spreading false information in a VANET. A malicious attacker can
create an arbitrary number of virtual non-existing vehicles and transmit false information in the
network to give a fake impression of traffic congestion and eventually divert the traffic un-
necessarily.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 164
4.2. EXISTING SYBIL ATTACK DETECTION SCHEMES
A. Group detection method
In Passive Ad-hoc Sybil Identity Detection (PASID) method [4]. A single node can detect Sybil
attacks by recording the identities namely the MAC or IP addresses of other nodes it hears
transmitting. Over time, the node builds a profile of which nodes are heard together, this helps reveal
Sybil attackers. This method reduces false positives that can occur when a group of nodes moving
together is falsely identified as a single Sybil attacker. By monitoring collisions at the MAC level,
we show that we can differentiate these cases. This approach is successful because an attacker
operation over a single channel can transmit only serially, whereas independent nodes can transmit in
parallel creating detectably higher collision rates.
B. Trusted Certification
It is the most common solution, mainly due to its potential to completely eliminate Sybil attacks [2].
However, trusted certification relies on a centralized authority that must guarantee that each node is
assigned exactly one identity, as indicated by possession of a certificate. This offers no method for
ensuring such uniqueness and in practice; it has to be performed by a manual configuration. This
manual procedure can be costly, and create a performance bottleneck in large-scale systems and in
order to be effective, the certifying authority must guarantee the existence of a mechanism to detect
and revoke lost or stolen identities. These requirements make trusted certification very difficult to
implement in ad-hoc networks which lack by definition, a centralized authority that can provide the
certification service.
C. Trusted Devices:
The use of trusted devices can be combined with trusted certification, binding one hardware device
to one network entity. While this can effectively, mitigate the Sybil attack. The main issue with this
approach is that there is no efficient way to prevent one entity from obtaining multiple hardware
devices other than manual intervention [3].
D. Domain Specific
There are some countermeasures that are application-domain specific. For example, in [2], a
detection mechanism for ad-hoc networks is proposed based on the location of each node. For an
attacker with a single device, all Sybil identities will always appear to move together. However, the
defense is not applicable beyond mobile networks and does not protect against malicious nodes with
multiple devices.
E. Resource Testing
The main goal of resource testing is to attempt to determine if a number of identities possess fewer
aggregated resources than would be expected if they were independent. In resource testing, it is
assumed that each physical entity has a bounded amount of a given resource (e.g., limited
bandwidth). The verifier then tests whether identities correspond to different physical entities by
verifying that each identity has as much resources as an independent physical device should have.
These tests include checks for computing power, storage ability and network bandwidth [5].
F. Radio Resource Testing
In this context, radio resource testing is a specific type of resource testing which relies on the
assumption that the device radios are incapable of simultaneously sending or receiving on two
different frequencies. This idea has been used in to counteract the Sybil attack [6]. However, the
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 165
authors do not address the details that would allow them to build a protocol capable of operating in
real world scenarios. Therefore, they do not present a comprehensive study on the cost and
complexity of solutions based on this technique.
G. Registration
One obvious way to prevent the Sybil attack is to perform identity registration. A difference between
peer-to-peer networks and wireless sensor networks is that in wireless sensor networks, there may be
a trusted central authority managing the network and thus knowing deployed nodes. The central
authority may also be able to disseminate that information securely to the network. To detect Sybil
attacks, an entity could poll the network and compare the results to the known deployment. To
prevent the Sybil attack, any node could check the list of “known-good’’ identities to validate
another node as legitimate. The list of known identities must be protected from being maliciously
modified. If the attacker is able to add identities to this list, he will be able to add Sybil nodes to the
network.
Disadvantages
Each of the defenses against the Sybil attack that we have examined has different tradeoffs. Most
defenses are not capable of defending against every type of Sybil attack [7]. Additionally, each
defense has different costs and relies on different assumptions. The radio resource verification
defense may be breakable with custom radio hardware, and validation may be expensive in terms of
energy. Node registration requires human work in order to securely add nodes to the network, and
requires a way to securely maintain and query the current known topology information.
V. PROPOSED DETECTION ALGORITHM
The proposed solution uses the position verification for detecting the attack. To mitigate the Sybil
attack, we blocked the Sybil node after detecting the Sybil node. We considered AOMDV as the
routing protocol used by the network. We assume the network nodes have low mobility and at the
time of registration process, they will be static and a number of nodes are already present in the
network. The basic assumption of our design is that each new node will come through the
registration process as shown in Figure 2. The registration process will register an identity once it is
confirmed through position finding process that the said identity is Sybil free, otherwise it will
simply be discarded. Each node will then record these registered identities in their Registered
Identity List (RIL) (each node maintains the RIL), which will therefore represent a Sybil free identity
list. Each node will take or provide services, such as packet forwarding etc, only to/from the nodes
that are stored in its RIL, otherwise their packets will be simply dropped.
5.1. Registration process
When a new node comes into the network its one-hop neighbors forward status information of new
node with each other. Status information constitutes the signal strength of receiving messages from
the new node. We can find the position of new node using signal strength. i.e., one hop neighbors
will collaboratively find the position of new node by exchanging the status information with each
other. By verifying the new position with register identity list, the new node is confirmed by the
neighbors to be Sybil free then they will update their Register Identity list and broadcast to its
neighbors to inform the neighbors about new node, otherwise it will simply discard.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 166
Figure 2. Sybil attack detection Scheme
5.2. Position finding process
According to Z. Sheng, etl [9] “The power received approximately decays with the square of
distance.”
Pr α Pt / d2
Where ‘Pr’ is the received power at the receiver node, ‘Pt’ is the transmit power at the transmitter
node, and‘d’ is the distance between the transmitter and the receiver. If the transmitted power is
known, the receiver node can deduce the distance between them and thereby use simple geometric
triangulation to locate the transmitter.
Zhong etl, 2004 showed that no node can hide its location in an environment where it is monitored
by four or more nodes. Using the ratio of RSSIs from these multiple receivers, no node can hide its
location from the authority that controls these monitoring nodes. The author proved as follows.
Suppose a node to be monitored transmits at the power ‘Pt’, node ’a’ will receive this signal at power
Pr(a) = Pt k/ da
α
Where ‘Pr(a)’ is the received power at the node ‘a’, ‘k’ is constant, ‘da’ is distance between node ‘a’
and the monitored node, and ‘α’ is the distance power gradient.
The ratio of the received signal at two different nodes, from a to b (a≠b) is
Pr(a) / Pr(b) =(da /db)α
Therefore
da /db= (Pr(a) / Pr(b))1/α
This equation is independent of the transmit power Pt. Now assume that the position of the
monitored node in two-dimensional Cartesian coordinates is (x, y), with nodes a,b,c and d positions
as (xa, ya), (xb, yb) , (xc, yc) and (xd, yd) respectively. The position (x,y) can be determined by
solving the following equation.
((x-xa) +(y-ya))2
= ( Pr(a)/ Pr(b)) 1/α
((x-xb) +(y-yb))2
= ( Pr(a)/ Pr(c)) 1/α
((x-xc) +(y-yc))2
= ( Pr(a)/ Pr(d)) 1/α
((x-xd) +(y-yd))2
Like this, one hop neighbors find the position of new node.
Figure 3. Sybil attack detection mechanism in wireless ad-hoc network
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 167
As shown in Figure 3 every node in the network maintains the RIL, which consist of node id and
Position. Whenever a new node enters into the network, its one hop neighbors find the Position of
new node as discussed in the Position finding process.
If new node id’s position is matched with RIL’s any node position, then that is the Sybil node,
otherwise new node is added to RIL.RIL is broadcast to every node in the Network. Each node will
take or provide services, such as packet forwarding etc, only to/from the nodes that are stored in its
RIL.
After detecting the Sybil node we are blocking the Sybil node. Then source select alternative path for
transferring the data to destination as shown in Fig.4. The proposed scheme will cause low
communication overhead because RILs are broadcasted only when a new node registers in the
network.
Figure 4. Blocking the Sybil node
VI. PERFORMANCE EVOLUTION
The simulation of the Sybil attack in wireless ad-hoc networks using an NS2 network simulator
[10]. First, we explain how a node behaves like a Sybil node in wireless ad-hoc network. Figure 5.
Shows a simple wireless ad-hoc network. Node-0 wants to communicate with node-7. Here, we are
using AOMDV protocol (Ad-hoc on-demand multipath distance vector protocol) for route
establishment [11].
Figure 5. Sybil node in the ad-hoc network
6.1. Simulation Parameters
The parameters used in our simulation are shown in Table 2. A node is selected and given multiple
identities which act as Sybil node.
Table 2. Simulation Parameters
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 168
PARAMETER VALUE
Number of nodes 20
Simulation time 50sec
Routing Protocol AOMDV
Queue Type Drop Tail
Packet Size 1500 bytes
Transport protocol TCP
Queue size 50
6.2. RESULTS
We used three simulations to analysis the implementation. In the first scenario we did not use any
Sybil node. In the second scenario we added a Sybil node to the simulation. In the third scenario we
added the proposed Sybil attack detection solution to attack simulation. Then we compared the
performance metrics throughput, packet delivery ratio among without attack simulation, with attack
simulation and attack with detection solution simulation.
Figure 6. Ad-hoc Network setup for Implementation
6.2.1. Throughput versus Simulation Time
Figure 6. Throughput vs. Simulation Time
6.2.2. Packet delivery ratio versus Simulation Time
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 169
Figure 7. Packet delivery ratio versus Simulation Time
It is observed from the Figure 6,7 that our mechanism gives increased throughput and packet
delivery ratio because our method block the Sybil node and choose another route after detection of
Sybil attack. Using our detection mechanism with AOMDV gives increased throughput and packet
delivery ratio compared to AOMDV.
VII. CONCLUSION AND FUTURE WORK
In this paper we explained the Sybil attack and position verification based mechanism for the
detection of Sybil node in Wireless Ad-hoc Networks. To mitigate the attack we block the node after
detecting the Sybil node. The detection mechanism is simulated using Network Simulator and found
to achieve the required security. The result shows that using our detection mechanism with AOMDV
gives increased throughput and packet delivery ratio compared to existing AOMDV. This is done on
the wireless ad-hoc networks where the nodes are static. It can be further extended to MANET’s in
which nodes are not static.
REFERENCES
[1] A. Burg (2003), “Ad hoc Network Specific Attacks”, Ad hoc networking: Concepts,
Applications and Security Seminar, Technische Universität München, 2003.
[2] J.R Douceur (2002), “The Sybil attack”, in Revised Papers from the First International
Workshop on Peer-to-Peer Systems, London, UK, pp 251–260, Springer-Verlag.
[3] Levine B.N, Shields C and Margolin N.B (2006), “A Survey of Solutions to the Sybil Attack”,
Tech report 2006-052, University of Massachusetts Amherst, Amherst, MA, October 2006.
[4] Piro, Chris, Shields, Clay, Levine and Brian Neil (2006), “Detecting the Sybil Attack in Mobile
Ad-hoc Networks”, IEEE Conference, Securecomm and Workshops 2006, pp 1-11.
[5] Haifeng Yu, Kaminsky M, Gibbons P.B and Flaxman A.D (2006),”SybilGuard: Defending
Against Sybil Attacks via Social Networks” , IEEE conference on Networking, IEEE/ACM
Transactions, Volume: 16, pp 576–589.
[6] J Newsome, Elaine Shi, Dawn Song, A. Perrig (2004), ”The Sybil attack in sensor networks:
analysis & defenses” ,IEEE conference, Information Processing in Sensor Networks, IPSN
2004,Third International Symposium 2004, pp 259–268.
[7] J. Wang, G. Yang, Y. Sun and S. Chen (2007), "Sybil Attack Detection Based on RSSI for
Wireless Sensor Network", in International Conference on Wireless Communications, Networking
and Mobile Computing (WiCom'07), 2007, pp 2684-2687.
[8] Ilyas, M. & R. Dorf (Eds.) (2003),” The handbook of ad hoc wireless networks”, Boca
Raton,FL, USA: CRC Press, Inc.
[9] Z. Sheng, L. Li, L. Yanbin and Y. Richard (2004), "Privacy-Preserving Location based
Services for Mobile Users in Wireless Networks", Department of Computer Science, Yale
University, Technical Report ALEU/DCS/TR-1297, 2004.
[10] UC Berkeley and USC ISI (1998), “The network simulator ns-2”, Part of the VINT project,
http://www.isi.edu/nsnam/ns.
[11] Marina, M.K, and Das S. R (2001), “On-demand Multipath Distance Vector Routing for Ad
Hoc Networks” Proc. of 9th
IEEE Int. Conf. On Network Protocols, pp 14-23.
Detection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manets

More Related Content

PDF
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
PDF
A REVIEW ON SYBIL ATTACK DETECTION TECHNIQUES
PDF
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
PDF
B130912
PDF
Security attacks and solutions in vehicular ad hoc networks a survey
PDF
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET
PDF
An ids scheme against black hole attack to secure aomdv routing in manet
PDF
A Review of Network Layer Attacks and Countermeasures in WSN
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A REVIEW ON SYBIL ATTACK DETECTION TECHNIQUES
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
B130912
Security attacks and solutions in vehicular ad hoc networks a survey
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET
An ids scheme against black hole attack to secure aomdv routing in manet
A Review of Network Layer Attacks and Countermeasures in WSN

What's hot (18)

PDF
Ijcet 06 07_001
PDF
SYBIL ATTACK ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORK
PDF
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
PDF
Survey on Different Packet Drop Detection Techniques in Mobile AdHoc Network
PDF
A comparitive study of efficient anonymous routing protocols in manet
PDF
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
PDF
Ktr an efficient key management scheme for secure data access control in wire...
PPTX
Rm presentation on research paper
PDF
D43021519
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
JCC_2015120915212763
PDF
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
PDF
SURVEY ON SECURE ROUTING IN VANETS
PDF
K1803036872
PPT
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
PDF
An overview of contemporary security problems in wireless mesh networks
PDF
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PDF
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
Ijcet 06 07_001
SYBIL ATTACK ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORK
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
Survey on Different Packet Drop Detection Techniques in Mobile AdHoc Network
A comparitive study of efficient anonymous routing protocols in manet
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
Ktr an efficient key management scheme for secure data access control in wire...
Rm presentation on research paper
D43021519
International Journal of Engineering Research and Development (IJERD)
JCC_2015120915212763
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
SURVEY ON SECURE ROUTING IN VANETS
K1803036872
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An overview of contemporary security problems in wireless mesh networks
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
Ad

Similar to Detection of-sybil-attack-using-position-verification-method-in-manets (20)

PDF
Sybil Attack Analysis and Detection Techniques in MANET
PDF
A review of sybil attack in manet
PPTX
Network Information And Security
PDF
IRJET- Analysis of Router Poisoning using Network Attacks
PDF
Unit_4_Full_pdf.pdf.pdf
PDF
I1802046780
PDF
Detection and Prevention of Attacks in Wireless Sensor Networks: A Survey
PDF
Sybil limit a near optimal social network defense against sybil attacks-2014
PDF
An Overview of security issues in Mobile Ad hoc Networks
PDF
Gw2412271231
PDF
Design & imlementation of tarf
PDF
Design & imlementation of tarf
PDF
Trusted Routing Path Selection in WSNs through TARF
PDF
Ijetcas14 538
PDF
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
PPTX
Secure routing in wsn-attacks and countermeasures
PPTX
11011 a0449 secure routing wsn
PDF
An improvement to trust based cross layer security protocol against sybil att...
PDF
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
Sybil Attack Analysis and Detection Techniques in MANET
A review of sybil attack in manet
Network Information And Security
IRJET- Analysis of Router Poisoning using Network Attacks
Unit_4_Full_pdf.pdf.pdf
I1802046780
Detection and Prevention of Attacks in Wireless Sensor Networks: A Survey
Sybil limit a near optimal social network defense against sybil attacks-2014
An Overview of security issues in Mobile Ad hoc Networks
Gw2412271231
Design & imlementation of tarf
Design & imlementation of tarf
Trusted Routing Path Selection in WSNs through TARF
Ijetcas14 538
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
Secure routing in wsn-attacks and countermeasures
11011 a0449 secure routing wsn
An improvement to trust based cross layer security protocol against sybil att...
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
Ad

More from Editor IJMTER (20)

PDF
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
PDF
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
PDF
Analysis of VoIP Traffic in WiMAX Environment
PDF
A Hybrid Cloud Approach for Secure Authorized De-Duplication
PDF
Aging protocols that could incapacitate the Internet
PDF
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
PDF
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
PDF
Sustainable Construction With Foam Concrete As A Green Green Building Material
PDF
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
PDF
Textual Data Partitioning with Relationship and Discriminative Analysis
PDF
Testing of Matrices Multiplication Methods on Different Processors
PDF
Survey on Malware Detection Techniques
PDF
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
PDF
SURVEY OF GLAUCOMA DETECTION METHODS
PDF
Survey: Multipath routing for Wireless Sensor Network
PDF
Step up DC-DC Impedance source network based PMDC Motor Drive
PDF
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
PDF
Software Quality Analysis Using Mutation Testing Scheme
PDF
Software Defect Prediction Using Local and Global Analysis
PDF
Software Cost Estimation Using Clustering and Ranking Scheme
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
Analysis of VoIP Traffic in WiMAX Environment
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Aging protocols that could incapacitate the Internet
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
Sustainable Construction With Foam Concrete As A Green Green Building Material
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
Textual Data Partitioning with Relationship and Discriminative Analysis
Testing of Matrices Multiplication Methods on Different Processors
Survey on Malware Detection Techniques
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF GLAUCOMA DETECTION METHODS
Survey: Multipath routing for Wireless Sensor Network
Step up DC-DC Impedance source network based PMDC Motor Drive
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
Software Quality Analysis Using Mutation Testing Scheme
Software Defect Prediction Using Local and Global Analysis
Software Cost Estimation Using Clustering and Ranking Scheme

Recently uploaded (20)

PPTX
Geodesy 1.pptx...............................................
PPTX
OOP with Java - Java Introduction (Basics)
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Sustainable Sites - Green Building Construction
PDF
Well-logging-methods_new................
PPTX
Construction Project Organization Group 2.pptx
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Geodesy 1.pptx...............................................
OOP with Java - Java Introduction (Basics)
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
bas. eng. economics group 4 presentation 1.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
additive manufacturing of ss316l using mig welding
Sustainable Sites - Green Building Construction
Well-logging-methods_new................
Construction Project Organization Group 2.pptx
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Foundation to blockchain - A guide to Blockchain Tech
Model Code of Practice - Construction Work - 21102022 .pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
CH1 Production IntroductoryConcepts.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Internet of Things (IOT) - A guide to understanding
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026

Detection of-sybil-attack-using-position-verification-method-in-manets

  • 1. International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 161 DETECTION OF SYBIL ATTACK USING POSITION VERIFICATION METHOD IN MANETS Ch. Niranjan Kumar1 , N.Satyanarayana2 1 CSE, Sumathi Reddy Institute of Technology for women, Telangana 2 Professor, Dept. of CSE, Nagole Institute of Technology and Science, Hyderabad Abstract— Compared to wired networks, Ad hoc networks are more vulnerable to security attacks due to the lack of trusted centralized authority, lack of trust relationships between nodes. This paper focuses on Sybil attack and its detection. A malicious node can generate and control a large number of logical identities on a single device. This gives the illusion to network as these are different legitimate nodes. An algorithm is proposed using position verification to detect the Sybil attack. The algorithm is implemented in Network Simulator and the throughput, and packet delivery ratio with and without Sybil attack. Keywords- Sybil attack; AOMDV; wireless ad hoc networks; position verification and NS2. I. INTRODUCTION Wireless ad-hoc networks are composed of autonomous nodes that are self managed without any infrastructure. Ad-hoc networks have a dynamic topology such that nodes can easily join or leave the network at any time. Ad-hoc networks have a dynamic topology such that nodes can easily join or leave the network at any time. Since the nodes communicate with each other without an infrastructure, they provide the connectivity by forwarding packets over themselves. To support this connectivity, nodes use some routing protocols such as AOMDV (Ad-hoc On-Demand multipath Distance Vector), AODV, DSR (Dynamic Source Routing) and DSDV (Destination-Sequenced Distance-Vector). Besides acting as a host, each node also acts as a router to discover a path and forward packets to the correct node in the network. Compared to wired networks, Ad-hoc networks are more vulnerable to security attacks due to the lack of trusted centralized authority, lack of trust relationships between nodes, easy eavesdropping, dynamic network topology, low bandwidth, battery and memory constraints of the devices. The attacks can be of many types where protocol compliant attack called Sybil attack is one of the most difficult attacks to detect. II. ADHOC NETWORK FEATURES Ad-hoc networks are best suited for use in situations where an infrastructure is unavailable or to deploy one is not cost effective [8]. The initial development of Ad-hoc networks was primarily driven by military applications where rapid network formation and survivability are key requirements. On the other hand, distributed network architecture with all nodes having equal responsibility and using broadcast radio is ideally suited to the military requirements. To overcome the limited radio transmission ranges (i.e. Not all nodes are within the range of every other node) nodes are equipped with the ability to forward information on behalf of others i.e. multi-hop communications. Combined with packet switching technology and suitable medium access control protocols, multi-hop communication provides the basis for resilient, large-scale military ad-hoc networks. • Independence from central network administration • Self-configuring, nodes are also routers
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 162 • Self-healing through continuous re-configuration • Scalable: Accommodates the addition of more nodes • Flexible: Similar to being able to access the Internet from many different locations. III. ATTACKS ON WIRELESS ADHOC NETWORKS Malicious and selfish nodes are the ones that fabricate attacks against physical, data link, net work, and application-layer functionality as shown in Table 1. Current routing protocols are exposed to active and passive attacks [1]. Active attacks: In an active attack, information is inserted into the network and thus the network operation or some nodes may be harmed. Through which the misbehaving node has to bear some energy costs in order to perform some harmful operation and nodes that perform active attacks with the aim of damaging other nodes by causing network outage are considered to be malicious. Passive Attacks: A passive attack does not disrupt the normal operation of the network. The attacker snoops the data exchanged in the network without altering it. Here, the requirement of confidentiality gets violated. Detection of a passive attack is very difficult for the operation of the network itself doesn’t get affected. One of the solutions to the problem is to use powerful encryption mechanism to encrypt the data being transmitted. Table 1. Types of Attacks IV. SYBIL ATTACK Malicious nodes in a network may not only impersonate one node, they could assume the identity of several nodes by doing so undermining the redundancy of many routing protocols. This attack is called the Sybil attack. Since ad-hoc networks depend on the communication between nodes, many systems apply redundant algorithms to ensure that the data gets from point A to point B. A consequence of this is that attackers have a harder time to destroy the integrity of information. If the same packet is sent over several distinct paths a change in the packets incoming from one of these paths can be detected easily. Thus, isolating a possible intruder in the network becomes possible. Also, if not the same packet but pieces of related information is sent on distinct routes, an eavesdropper might have difficulties putting together the pieces of the information puzzle. However, if a single malicious node is able to represent several other nodes, the effectiveness of these measures is significantly degraded. The attacker may get access to all pieces of the fragmented information or may alter all packets in the same transmission, so that the destination node cannot detect tampering anymore. In a trust-based routing environment, representing multiple identities can be abused to deliver fake recommendations about the trustworthiness of a certain party, hereby attracting more traffic to it in ideal starting point for further attack. Application layer Repudiation, malicious code Transport layer Session hijacking, SYN flooding Network layer Wormhole, Black hole, Gray hole, flooding, Sybil attack Data link layer Traffic analysis, monitoring Physical layer Jamming, eavesdropping
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 163 Figure 1. Sybil Attack Sybil attack is more severe attack, in which attacker disrupts both network topology and multi-path routing protocol functionality. To disturb network topology, adversary often changes the locations with different legitimate node ids. To disturb multi-path routing, the attacker appears with multiple identities in the network, which are taken from the compromised node and appearing in most of the node disjoint paths. Figure 1. Shows the Sybil attack. In this scenario, malicious node X has three identities M1, M2 and M3 and all these identities are spoofed in passive mode. A and F are source and destination nodes need to have multipath between them. Here, malicious node will appear in all multiple paths with different identities such as (A,C,D,M1,F),(A,B,G,M2,F) and (A,B,G,H,I,M3,F). 4.1. Sybil attack on protocols In Sybil attack, a Sybil node illegitimately claims multiple identities. A Sybil node can generate and control a large number of logical identities on a single physical device. This gives the illusion to the network as if it were different legitimate nodes[3]. It can affect following protocols. A. Distributed Storage A Sybil attack can disrupt the architecture where data is usually replicated or fragmented on several nodes such as where distributed hash tables are used because in reality data will be stored on Sybil identities generated by the same malicious node. B. A routing Routing mechanism in which the nodes are supposed to be disjoint is affected by Sybil identities because one node will be present in the various paths and different locations at the same time. C. Data aggregation In a sensor network due to the lack of resources, data is often aggregated to one node. A Sybil node can change the whole aggregation reading outcome by contributing many times as a different user. D. Voting Most often in ad hoc and peer-to-peer networks a decision is made using voting where a Sybil node can control the result by rigging the polling process using multiple virtual identities. E. Misbehavior Detection In misbehavior detection schemes a Sybil node can increase its reputation, credit, or trust, value and can decrease the same value of the other legitimate nodes by exploiting its virtual identities. Eventually, it can diminish the detection accuracy of an intrusion detection system. F. Traffic Congestion in a Vehicular Ad hoc Network (VANET) A malicious attacker can create the illusion of traffic congestion by spreading false information in a VANET. A malicious attacker can create an arbitrary number of virtual non-existing vehicles and transmit false information in the network to give a fake impression of traffic congestion and eventually divert the traffic un- necessarily.
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 164 4.2. EXISTING SYBIL ATTACK DETECTION SCHEMES A. Group detection method In Passive Ad-hoc Sybil Identity Detection (PASID) method [4]. A single node can detect Sybil attacks by recording the identities namely the MAC or IP addresses of other nodes it hears transmitting. Over time, the node builds a profile of which nodes are heard together, this helps reveal Sybil attackers. This method reduces false positives that can occur when a group of nodes moving together is falsely identified as a single Sybil attacker. By monitoring collisions at the MAC level, we show that we can differentiate these cases. This approach is successful because an attacker operation over a single channel can transmit only serially, whereas independent nodes can transmit in parallel creating detectably higher collision rates. B. Trusted Certification It is the most common solution, mainly due to its potential to completely eliminate Sybil attacks [2]. However, trusted certification relies on a centralized authority that must guarantee that each node is assigned exactly one identity, as indicated by possession of a certificate. This offers no method for ensuring such uniqueness and in practice; it has to be performed by a manual configuration. This manual procedure can be costly, and create a performance bottleneck in large-scale systems and in order to be effective, the certifying authority must guarantee the existence of a mechanism to detect and revoke lost or stolen identities. These requirements make trusted certification very difficult to implement in ad-hoc networks which lack by definition, a centralized authority that can provide the certification service. C. Trusted Devices: The use of trusted devices can be combined with trusted certification, binding one hardware device to one network entity. While this can effectively, mitigate the Sybil attack. The main issue with this approach is that there is no efficient way to prevent one entity from obtaining multiple hardware devices other than manual intervention [3]. D. Domain Specific There are some countermeasures that are application-domain specific. For example, in [2], a detection mechanism for ad-hoc networks is proposed based on the location of each node. For an attacker with a single device, all Sybil identities will always appear to move together. However, the defense is not applicable beyond mobile networks and does not protect against malicious nodes with multiple devices. E. Resource Testing The main goal of resource testing is to attempt to determine if a number of identities possess fewer aggregated resources than would be expected if they were independent. In resource testing, it is assumed that each physical entity has a bounded amount of a given resource (e.g., limited bandwidth). The verifier then tests whether identities correspond to different physical entities by verifying that each identity has as much resources as an independent physical device should have. These tests include checks for computing power, storage ability and network bandwidth [5]. F. Radio Resource Testing In this context, radio resource testing is a specific type of resource testing which relies on the assumption that the device radios are incapable of simultaneously sending or receiving on two different frequencies. This idea has been used in to counteract the Sybil attack [6]. However, the
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 165 authors do not address the details that would allow them to build a protocol capable of operating in real world scenarios. Therefore, they do not present a comprehensive study on the cost and complexity of solutions based on this technique. G. Registration One obvious way to prevent the Sybil attack is to perform identity registration. A difference between peer-to-peer networks and wireless sensor networks is that in wireless sensor networks, there may be a trusted central authority managing the network and thus knowing deployed nodes. The central authority may also be able to disseminate that information securely to the network. To detect Sybil attacks, an entity could poll the network and compare the results to the known deployment. To prevent the Sybil attack, any node could check the list of “known-good’’ identities to validate another node as legitimate. The list of known identities must be protected from being maliciously modified. If the attacker is able to add identities to this list, he will be able to add Sybil nodes to the network. Disadvantages Each of the defenses against the Sybil attack that we have examined has different tradeoffs. Most defenses are not capable of defending against every type of Sybil attack [7]. Additionally, each defense has different costs and relies on different assumptions. The radio resource verification defense may be breakable with custom radio hardware, and validation may be expensive in terms of energy. Node registration requires human work in order to securely add nodes to the network, and requires a way to securely maintain and query the current known topology information. V. PROPOSED DETECTION ALGORITHM The proposed solution uses the position verification for detecting the attack. To mitigate the Sybil attack, we blocked the Sybil node after detecting the Sybil node. We considered AOMDV as the routing protocol used by the network. We assume the network nodes have low mobility and at the time of registration process, they will be static and a number of nodes are already present in the network. The basic assumption of our design is that each new node will come through the registration process as shown in Figure 2. The registration process will register an identity once it is confirmed through position finding process that the said identity is Sybil free, otherwise it will simply be discarded. Each node will then record these registered identities in their Registered Identity List (RIL) (each node maintains the RIL), which will therefore represent a Sybil free identity list. Each node will take or provide services, such as packet forwarding etc, only to/from the nodes that are stored in its RIL, otherwise their packets will be simply dropped. 5.1. Registration process When a new node comes into the network its one-hop neighbors forward status information of new node with each other. Status information constitutes the signal strength of receiving messages from the new node. We can find the position of new node using signal strength. i.e., one hop neighbors will collaboratively find the position of new node by exchanging the status information with each other. By verifying the new position with register identity list, the new node is confirmed by the neighbors to be Sybil free then they will update their Register Identity list and broadcast to its neighbors to inform the neighbors about new node, otherwise it will simply discard.
  • 6. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 166 Figure 2. Sybil attack detection Scheme 5.2. Position finding process According to Z. Sheng, etl [9] “The power received approximately decays with the square of distance.” Pr α Pt / d2 Where ‘Pr’ is the received power at the receiver node, ‘Pt’ is the transmit power at the transmitter node, and‘d’ is the distance between the transmitter and the receiver. If the transmitted power is known, the receiver node can deduce the distance between them and thereby use simple geometric triangulation to locate the transmitter. Zhong etl, 2004 showed that no node can hide its location in an environment where it is monitored by four or more nodes. Using the ratio of RSSIs from these multiple receivers, no node can hide its location from the authority that controls these monitoring nodes. The author proved as follows. Suppose a node to be monitored transmits at the power ‘Pt’, node ’a’ will receive this signal at power Pr(a) = Pt k/ da α Where ‘Pr(a)’ is the received power at the node ‘a’, ‘k’ is constant, ‘da’ is distance between node ‘a’ and the monitored node, and ‘α’ is the distance power gradient. The ratio of the received signal at two different nodes, from a to b (a≠b) is Pr(a) / Pr(b) =(da /db)α Therefore da /db= (Pr(a) / Pr(b))1/α This equation is independent of the transmit power Pt. Now assume that the position of the monitored node in two-dimensional Cartesian coordinates is (x, y), with nodes a,b,c and d positions as (xa, ya), (xb, yb) , (xc, yc) and (xd, yd) respectively. The position (x,y) can be determined by solving the following equation. ((x-xa) +(y-ya))2 = ( Pr(a)/ Pr(b)) 1/α ((x-xb) +(y-yb))2 = ( Pr(a)/ Pr(c)) 1/α ((x-xc) +(y-yc))2 = ( Pr(a)/ Pr(d)) 1/α ((x-xd) +(y-yd))2 Like this, one hop neighbors find the position of new node. Figure 3. Sybil attack detection mechanism in wireless ad-hoc network
  • 7. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 167 As shown in Figure 3 every node in the network maintains the RIL, which consist of node id and Position. Whenever a new node enters into the network, its one hop neighbors find the Position of new node as discussed in the Position finding process. If new node id’s position is matched with RIL’s any node position, then that is the Sybil node, otherwise new node is added to RIL.RIL is broadcast to every node in the Network. Each node will take or provide services, such as packet forwarding etc, only to/from the nodes that are stored in its RIL. After detecting the Sybil node we are blocking the Sybil node. Then source select alternative path for transferring the data to destination as shown in Fig.4. The proposed scheme will cause low communication overhead because RILs are broadcasted only when a new node registers in the network. Figure 4. Blocking the Sybil node VI. PERFORMANCE EVOLUTION The simulation of the Sybil attack in wireless ad-hoc networks using an NS2 network simulator [10]. First, we explain how a node behaves like a Sybil node in wireless ad-hoc network. Figure 5. Shows a simple wireless ad-hoc network. Node-0 wants to communicate with node-7. Here, we are using AOMDV protocol (Ad-hoc on-demand multipath distance vector protocol) for route establishment [11]. Figure 5. Sybil node in the ad-hoc network 6.1. Simulation Parameters The parameters used in our simulation are shown in Table 2. A node is selected and given multiple identities which act as Sybil node. Table 2. Simulation Parameters
  • 8. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 168 PARAMETER VALUE Number of nodes 20 Simulation time 50sec Routing Protocol AOMDV Queue Type Drop Tail Packet Size 1500 bytes Transport protocol TCP Queue size 50 6.2. RESULTS We used three simulations to analysis the implementation. In the first scenario we did not use any Sybil node. In the second scenario we added a Sybil node to the simulation. In the third scenario we added the proposed Sybil attack detection solution to attack simulation. Then we compared the performance metrics throughput, packet delivery ratio among without attack simulation, with attack simulation and attack with detection solution simulation. Figure 6. Ad-hoc Network setup for Implementation 6.2.1. Throughput versus Simulation Time Figure 6. Throughput vs. Simulation Time 6.2.2. Packet delivery ratio versus Simulation Time
  • 9. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 06, [December - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 169 Figure 7. Packet delivery ratio versus Simulation Time It is observed from the Figure 6,7 that our mechanism gives increased throughput and packet delivery ratio because our method block the Sybil node and choose another route after detection of Sybil attack. Using our detection mechanism with AOMDV gives increased throughput and packet delivery ratio compared to AOMDV. VII. CONCLUSION AND FUTURE WORK In this paper we explained the Sybil attack and position verification based mechanism for the detection of Sybil node in Wireless Ad-hoc Networks. To mitigate the attack we block the node after detecting the Sybil node. The detection mechanism is simulated using Network Simulator and found to achieve the required security. The result shows that using our detection mechanism with AOMDV gives increased throughput and packet delivery ratio compared to existing AOMDV. This is done on the wireless ad-hoc networks where the nodes are static. It can be further extended to MANET’s in which nodes are not static. REFERENCES [1] A. Burg (2003), “Ad hoc Network Specific Attacks”, Ad hoc networking: Concepts, Applications and Security Seminar, Technische Universität München, 2003. [2] J.R Douceur (2002), “The Sybil attack”, in Revised Papers from the First International Workshop on Peer-to-Peer Systems, London, UK, pp 251–260, Springer-Verlag. [3] Levine B.N, Shields C and Margolin N.B (2006), “A Survey of Solutions to the Sybil Attack”, Tech report 2006-052, University of Massachusetts Amherst, Amherst, MA, October 2006. [4] Piro, Chris, Shields, Clay, Levine and Brian Neil (2006), “Detecting the Sybil Attack in Mobile Ad-hoc Networks”, IEEE Conference, Securecomm and Workshops 2006, pp 1-11. [5] Haifeng Yu, Kaminsky M, Gibbons P.B and Flaxman A.D (2006),”SybilGuard: Defending Against Sybil Attacks via Social Networks” , IEEE conference on Networking, IEEE/ACM Transactions, Volume: 16, pp 576–589. [6] J Newsome, Elaine Shi, Dawn Song, A. Perrig (2004), ”The Sybil attack in sensor networks: analysis & defenses” ,IEEE conference, Information Processing in Sensor Networks, IPSN 2004,Third International Symposium 2004, pp 259–268. [7] J. Wang, G. Yang, Y. Sun and S. Chen (2007), "Sybil Attack Detection Based on RSSI for Wireless Sensor Network", in International Conference on Wireless Communications, Networking and Mobile Computing (WiCom'07), 2007, pp 2684-2687. [8] Ilyas, M. & R. Dorf (Eds.) (2003),” The handbook of ad hoc wireless networks”, Boca Raton,FL, USA: CRC Press, Inc. [9] Z. Sheng, L. Li, L. Yanbin and Y. Richard (2004), "Privacy-Preserving Location based Services for Mobile Users in Wireless Networks", Department of Computer Science, Yale University, Technical Report ALEU/DCS/TR-1297, 2004. [10] UC Berkeley and USC ISI (1998), “The network simulator ns-2”, Part of the VINT project, http://www.isi.edu/nsnam/ns. [11] Marina, M.K, and Das S. R (2001), “On-demand Multipath Distance Vector Routing for Ad Hoc Networks” Proc. of 9th IEEE Int. Conf. On Network Protocols, pp 14-23.