Efficient Approaches to Mitigate the Effect of Sybil Attack in MANET for High Network Lifetime: A review

MANET is known as a self configuring, dynamic infrastructure to connect mobile devices through wireless. There are several challenges which affect the MANET, such as routing, security and reliability, power consumption, inter-networking, multicast and so on. M Being in such environment, some malicious behaviour can affect the security of networking. This mystifying situation usually occurs in MANET because of the intrinsic design defects. Malicious nodes which are generated using Sybil attack intentionally drop all packets which are having destinations to the target locations by making the duplicate copy of the original nodes. Malicious nodes disturb the linking of the network. Selfish type of nodes aims to reserve their resources, and degrades the network performance. Our paper targets to explore various detection and mitigation approach of Sybil attack. This paper classifies and exhibits every mechanism as per certain perspectives.

[1]  Dieter Hogrefe,et al.  Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks , 2018, IEEE Access.

[2]  Konstantin Beznosov,et al.  Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs , 2015, NDSS.

[3]  Shehnaz T. Patel,et al.  A review: Sybil attack detection techniques in WSN , 2017, 2017 4th International Conference on Electronics and Communication Systems (ICECS).

[4]  Takahiro HARA,et al.  Data management issues in mobile ad hoc networks , 2017, Proceedings of the Japan Academy. Series B, Physical and biological sciences.

[5]  Issa M. Khalil,et al.  Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure , 2011, IEEE Transactions on Mobile Computing.

[6]  R. S. Bhuvaneswaran,et al.  DETECTION AND PREVENTION OF SYBIL ATTACK IN WIRELESS SENSOR NETWORK EMPLOYING RANDOM PASSWORD COMPARISON METHOD , 2014 .

[7]  R. Sivakami,et al.  A Radical Block to Byzantine Attacks in Mobile Ad Hoc Networks , 2016, Wirel. Pers. Commun..

[8]  Larry J. Greenstein,et al.  Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.

[9]  Shailesh D. Kamble,et al.  Detection and Mitigation of Sybil Attack in Peer-to-peer Network , 2016 .

[10]  Abdelkamel Tari,et al.  Secure and reliable certificate chains recovery protocol for mobile ad hoc networks , 2016, J. Netw. Comput. Appl..

[11]  Mohsen Guizani,et al.  Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[12]  Mohini Kumrawat,et al.  Optimizing energy consumption in wireless sensor network through distributed weighted clustering algorithm , 2015, 2015 International Conference on Computer, Communication and Control (IC4).

[13]  J. I. Sheeba,et al.  Identification of Sybil Attack on Social Networks , 2016 .

[14]  Prateek Mittal,et al.  SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection , 2013, IEEE Transactions on Information Forensics and Security.

[15]  Noureddine Boudriga,et al.  An RFID based System for the detection of Sybil attack in Military Wireless Sensor networks , 2014, 2014 World Congress on Computer Applications and Information Systems (WCCAIS).

[16]  Ben Y. Zhao,et al.  Uncovering social network sybils in the wild , 2011, IMC '11.

[17]  A. Babu Karuppiah,et al.  SYBILSECURE: AN ENERGY EFFICIENT SYBIL ATTACK DETECTION TECHNIQUE IN WIRELESS SENSOR NETWORK , 2014 .

[18]  K. Nirmal Raja,et al.  Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack , 2017, Journal of medical systems.

[19]  Jin-Hee Cho,et al.  Trust threshold based public key management in mobile ad hoc networks , 2016, Ad Hoc Networks.

[20]  Hamzeh Beyranvand,et al.  Cellular Underwater Wireless Optical CDMA Network: Potentials and Challenges , 2016, IEEE Access.

[21]  Feng Xiao,et al.  DSybil: Optimal Sybil-Resistance for Recommendation Systems , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[22]  Ratnaraj Kumar,et al.  Recent Trends in Sybil Attacks and Defense Techniques in Social Networks , 2014 .

[23]  Fengyuan Xu,et al.  SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[24]  Javad Musevi Niya,et al.  Security bootstrapping of mobile ad hoc networks using identity-based cryptography , 2016, Secur. Commun. Networks.

[25]  Laurence T. Yang,et al.  Analytical Model for Sybil Attack Phases in Internet of Things , 2019, IEEE Internet of Things Journal.

[26]  Luciano Paschoal Gaspary,et al.  Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks , 2012, Comput. Networks.

[27]  B. Paramasivan,et al.  Defense against Sybil attacks and authentication for anonymous location-based routing in MANET , 2017, Wirel. Networks.