Skip to main content
Top

2021 | OriginalPaper | Chapter

Analytical Classification of Sybil Attack Detection Techniques

Authors : Ankita S. Koleshwar, S. S. Sherekar, V. M. Thakare, Aniruddha Kanhe

Published in: Intelligent Data Communication Technologies and Internet of Things

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Secured network is an important issue in today’s era. The various defense techniques have been developed to protect the network from the attacks which hampers the performance of the network. The attacks like Blackhole, Identity Spoofing, Sybil, etc. are observed. In such types of attacks, the Sybil is the destructive attack. In Sybil attack, attacker misleads the other nodes by viewing the wrong identity of the users who are alert from the nodes in the network. In a Sybil attack, a node illegitimately claims various identities. Sybil attack intimidates network in routing, fair resource allocation, data aggregation and misbehavior detection. This paper focuses on a systematic study of Sybil attack and gives the critical analysis of the various parameters which affects the performance along with the advantages and limitations.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sarigiannidis P, Karapistoli E, Economides AA (2016) Analysing indirect sybil attacks in randomly deployed wireless sensor networks. In: 2016 IEEE 27th annual international symposium on personal, indoor, and mobile radio communications (PIMRC), Sept 2016, pp 1–6 Sarigiannidis P, Karapistoli E, Economides AA (2016) Analysing indirect sybil attacks in randomly deployed wireless sensor networks. In: 2016 IEEE 27th annual international symposium on personal, indoor, and mobile radio communications (PIMRC), Sept 2016, pp 1–6
2.
go back to reference Al-Qurishi M, Al-Rakhami M, Alamri A, Alrubaian M, Rahman SMM, Hossain MS (2017) Sybil defense techniques in online social networks: a survey. IEEE Access 5:1200–1219CrossRef Al-Qurishi M, Al-Rakhami M, Alamri A, Alrubaian M, Rahman SMM, Hossain MS (2017) Sybil defense techniques in online social networks: a survey. IEEE Access 5:1200–1219CrossRef
3.
go back to reference Sharmila S, Umamaheswari G (2012) Detection of sybil attack in mobile wireless sensor networks. Int J Eng Sci Adv Technol 2(2):256–262 Sharmila S, Umamaheswari G (2012) Detection of sybil attack in mobile wireless sensor networks. Int J Eng Sci Adv Technol 2(2):256–262
4.
go back to reference Valarmathi M, Meenakowshalya A, Bharathi A (2016) Robust sybil attack detection mechanism for social networks-a survey. In: 2016 3rd International conference on advanced computing and communication systems (ICACCS), vol 1, pp 1–5. IEEE Valarmathi M, Meenakowshalya A, Bharathi A (2016) Robust sybil attack detection mechanism for social networks-a survey. In: 2016 3rd International conference on advanced computing and communication systems (ICACCS), vol 1, pp 1–5. IEEE
5.
go back to reference Pooja M, Singh DY (2013) Security issues and sybil attack in wireless sensor networks. Int J P2P Netw Trends Technol 3(1):7–13 Pooja M, Singh DY (2013) Security issues and sybil attack in wireless sensor networks. Int J P2P Netw Trends Technol 3(1):7–13
6.
go back to reference Chang W, Wu J (2012) A survey of sybil attacks in networks Chang W, Wu J (2012) A survey of sybil attacks in networks
7.
go back to reference Sohail Abbas DL-J, Merabti M, Kifayat K (2013) Lightweight sybil attack detection in manets. IEEE Syst J 7:236–248 Sohail Abbas DL-J, Merabti M, Kifayat K (2013) Lightweight sybil attack detection in manets. IEEE Syst J 7:236–248
8.
go back to reference Joshi N, Challa M (2014) Secure authentication protocol to detect sybil attacks in manets. Int J Comput Sci Eng Technol 5:645–653 Joshi N, Challa M (2014) Secure authentication protocol to detect sybil attacks in manets. Int J Comput Sci Eng Technol 5:645–653
9.
go back to reference Hashmi S, Brooke J (2010) Towards sybil resistant authentication in mobile ad hoc networks. In: 2010 Fourth international conference on emerging security information, systems and technologies, pp 17–24 Hashmi S, Brooke J (2010) Towards sybil resistant authentication in mobile ad hoc networks. In: 2010 Fourth international conference on emerging security information, systems and technologies, pp 17–24
10.
go back to reference Danish Shehzad NUA, Umar AI, Ishaq W (2014) A novel mechanism for detection of sybil attack in manets. In: International conference on computer science and information systems, Oct 2014 Danish Shehzad NUA, Umar AI, Ishaq W (2014) A novel mechanism for detection of sybil attack in manets. In: International conference on computer science and information systems, Oct 2014
11.
go back to reference Alvisi L, Clement A, Epasto A, Lattanzi S, Panconesi A (2013) Sok: the evolution of sybil defense via social networks. In: 2013 IEEE symposium on security and privacy (SP), pp 382–396. IEEE Alvisi L, Clement A, Epasto A, Lattanzi S, Panconesi A (2013) Sok: the evolution of sybil defense via social networks. In: 2013 IEEE symposium on security and privacy (SP), pp 382–396. IEEE
12.
go back to reference Sharmila S, Umamaheswari G (2013) Node id-based detection of sybil attack in mobile wireless sensor network. Int J Electron 100(10):1441–1454CrossRef Sharmila S, Umamaheswari G (2013) Node id-based detection of sybil attack in mobile wireless sensor network. Int J Electron 100(10):1441–1454CrossRef
13.
go back to reference Alsaedi N, Hashim F, Sali A (2015) Energy trust system for detecting sybil attack in clustered wireless sensor networks. In: 2015 IEEE 12th Malaysia international conference on communications (MICC), pp 91–95 Alsaedi N, Hashim F, Sali A (2015) Energy trust system for detecting sybil attack in clustered wireless sensor networks. In: 2015 IEEE 12th Malaysia international conference on communications (MICC), pp 91–95
14.
go back to reference Prabhjotkaur AC, Singh S (2016) Review paper of detection and prevention of sybil attack in wsn using centralized ids. Int J Eng Sci 8399 Prabhjotkaur AC, Singh S (2016) Review paper of detection and prevention of sybil attack in wsn using centralized ids. Int J Eng Sci 8399
15.
go back to reference Moradi S, Alavi M (2016) A distributed method based on mobile agent to detect sybil attacks in wireless sensor networks. In: 2016 Eighth international conference on information and knowledge technology (IKT), pp 276–280 Moradi S, Alavi M (2016) A distributed method based on mobile agent to detect sybil attacks in wireless sensor networks. In: 2016 Eighth international conference on information and knowledge technology (IKT), pp 276–280
16.
go back to reference Lakhanpal R, Sharma S (2016) Detection prevention of sybil attack in ad hoc network using hybrid map mac technique. In: 2016 International conference on computation of power, energy information and communication (ICCPEIC), pp 283–287 Lakhanpal R, Sharma S (2016) Detection prevention of sybil attack in ad hoc network using hybrid map mac technique. In: 2016 International conference on computation of power, energy information and communication (ICCPEIC), pp 283–287
17.
go back to reference Evangelista D, Mezghani F, Nogueira M, Santos A (2016) Evaluation of sybil attack detection approaches in the internet of things content dissemination. In: 2016 Wireless days (WD), pp 1–6 Evangelista D, Mezghani F, Nogueira M, Santos A (2016) Evaluation of sybil attack detection approaches in the internet of things content dissemination. In: 2016 Wireless days (WD), pp 1–6
18.
go back to reference Singh R, Singh J, Singh R (2017) A novel sybil attack detection technique for wireless sensor networks. Adv Comput Sci Technol 10(2):185–202 Singh R, Singh J, Singh R (2017) A novel sybil attack detection technique for wireless sensor networks. Adv Comput Sci Technol 10(2):185–202
19.
go back to reference Kavitha P, Keerthana C, Niroja V, Vivekanandhan V (2014) Mobile-id based sybil attack detection on the mobile adhoc network. Int J Commun Comput Technol 2(02) Kavitha P, Keerthana C, Niroja V, Vivekanandhan V (2014) Mobile-id based sybil attack detection on the mobile adhoc network. Int J Commun Comput Technol 2(02)
20.
go back to reference Vasudeva A, Sood M (2012) Sybil attack on lowest id clustering algo-rithm in the mobile ad hoc network. Int J Netw Secur Appl 4(5):135 Vasudeva A, Sood M (2012) Sybil attack on lowest id clustering algo-rithm in the mobile ad hoc network. Int J Netw Secur Appl 4(5):135
21.
go back to reference Ramesh MM (2016) Sadam: sybil attack detection approach in manets using testbed. Int J Sci Eng Comput Technol 6(9):317 Ramesh MM (2016) Sadam: sybil attack detection approach in manets using testbed. Int J Sci Eng Comput Technol 6(9):317
22.
go back to reference Chang S-H, Chen Y-S, Cheng S-M (2013) Detection of sybil attacks in participatory sensing using cloud-based trust management system. In: 2013 International symposium on wireless and pervasive computing (ISWPC), pp 1–6. IEEE Chang S-H, Chen Y-S, Cheng S-M (2013) Detection of sybil attacks in participatory sensing using cloud-based trust management system. In: 2013 International symposium on wireless and pervasive computing (ISWPC), pp 1–6. IEEE
Metadata
Title
Analytical Classification of Sybil Attack Detection Techniques
Authors
Ankita S. Koleshwar
S. S. Sherekar
V. M. Thakare
Aniruddha Kanhe
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-9509-7_8