Sybil attack defending trusted AODV in ad-hoc netwok

@article{Hazra2012SybilAD,
  title={Sybil attack defending trusted AODV in ad-hoc netwok},
  author={Swarnali Hazra and S. K. Setua},
  journal={Proceedings of 2012 2nd International Conference on Computer Science and Network Technology},
  year={2012},
  pages={643-647}
}
Security is most essential for communication in ad-hoc network to secure data delivery between source node and destination node. A very well known harmful attack is Sybil attack where a node pretends multiple identities of several target nodes. In this paper, we have introduced an on-demand trusted approach to defend Sybil attack. We have chosen a on-demand routing protocol, AODV and proposed a trust computation based sybil attack avoidance mechanism in AODV, by enhancing the protocol along… CONTINUE READING

Citations

Publications citing this paper.
Showing 1-4 of 4 extracted citations

A Proposed Framework for Protection of Identity Based Attack in Zigbee

2015 Fifth International Conference on Communication Systems and Network Technologies • 2015
View 3 Excerpts
Highly Influenced

Mitigate black hole attack using trust with AODV in MANET

2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) • 2016
View 1 Excerpt

A detection technique for identity based attacks in clustered mobile ad-hoc networks

2015 International Conference on Advances in Computer Engineering and Applications • 2015
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-5 of 5 references

Deection of Sybil Attack in Mobile Wireless Sensor Networks

S. Sharmila, G Umamaheswari
International Journal of Engineering Science & Advanced Technology, 2012, • 2012
View 1 Excerpt

The Sybil Attack in Sensor Networks: Analysis & Defenses”, IPSN’04

James Newsome, Elaine Shi, Dawn Song, Adrian Perrig
April 26– • 2004

Similar Papers

Loading similar papers…