Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7354
Title: Impersonation Based Sybil attack to Disrupt the Highest Degree Clustering Algorithm in Mobile Ad Hoc Networks
Authors: Prakash, Prem
Vasudeva, Amol [Guided by]
Keywords: Sybil attack
Ad Hoc networks
Issue Date: 2016
Publisher: Jaypee University of Information Technology, Solan, H.P.
Abstract: Mobile ad hoc networks (MANET) is a self-configuring and infrastructure-less network of mobile devices. Since the topology of this network is dynamically changing and there is no central management so it becomes difficult to implement security and this gives an opportunity to intrude into the network and exploit the weaknesses of the same. Sybil attack is one such attack which takes the advantage of characteristics of MANET and disrupts the network. In a Sybil attack malicious node illegitimately claims multiple identities. This attack has the ability to seriously disrupt various operations like data aggregation, voting, fair resource allocation scheme, misbehavior detection and routing mechanisms etc. In addition to launching a Sybil attack in this project we also aim to disrupt the head selection algorithm of highest degree clustering protocol. We aim to introduce a malicious node into the network known as Sybil node which would slowly take over as the head of the cluster by impersonating itself. Once the Sybil node becomes the head of the cluster, it can disrupt various operations and gain unfair amount of resources which would render the network ineffectual. In this project we visualize how a MANET works and the way clusters are formed. In addition we see how the communication between the mobile devices occur and how the head of a cluster is selected. Once a MANET is established we introduce a Sybil node which would impersonate itself and unsettle the system.
URI: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7354
Appears in Collections:B.Tech. Project Reports



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.