Different types of Sybili attacks and their importance and properties for finding latest mechanism
DOI:
https://doi.org/10.7439/ijasr.v1i9.2462Abstract
A Mobile Ad hoc Network (MANET) consists of a set of communicating wireless mobile nodes or devices that do not have any form of fixed infrastructure or centralized authority. The security in MANET has become a significant and active topic within the research community. This is because of the high demand in sharing streaming video and audio in various applications .Once MANET is setup it quickly facilitate communications in a hostile environment such as battlefield or emergency situation likes disaster rescue operation. In spite of the several attacks aimed at specific nodes in MANET that have been uncovered, some attacks involving multiple nodes still receive little attention. A reason behind this is because people make use of security mechanisms applicable to wired networks in MANET and overlook the security measures that apply to MANET. Furthermore, it may also have to do with the fact that no survey or taxonomy has been done to clarify the characteristics of different multiple node attacks. This paper addresses the mentioned gap by providing a proper definition and categorization of Sybil attacks in MANET. The whole simulation will take place in MATLAB environment. In the end performance is measured by using the parameters like network load and throughput.Downloads
Download data is not yet available.
Downloads
Published
22-10-2015
Issue
Section
Review Articles
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeThe Effect of Open Access).
How to Cite
1.
Sharma B, Badhan R. Different types of Sybili attacks and their importance and properties for finding latest mechanism. Int J of Adv in Sci Res [Internet]. 2015 Oct. 22 [cited 2026 Feb. 15];1(9):344-5. Available from: https://ssjournals.co.in/index.php/ijasr/article/view/2462