Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7354
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPrakash, Prem-
dc.contributor.authorVasudeva, Amol [Guided by]-
dc.date.accessioned2022-10-07T06:51:29Z-
dc.date.available2022-10-07T06:51:29Z-
dc.date.issued2016-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7354-
dc.description.abstractMobile ad hoc networks (MANET) is a self-configuring and infrastructure-less network of mobile devices. Since the topology of this network is dynamically changing and there is no central management so it becomes difficult to implement security and this gives an opportunity to intrude into the network and exploit the weaknesses of the same. Sybil attack is one such attack which takes the advantage of characteristics of MANET and disrupts the network. In a Sybil attack malicious node illegitimately claims multiple identities. This attack has the ability to seriously disrupt various operations like data aggregation, voting, fair resource allocation scheme, misbehavior detection and routing mechanisms etc. In addition to launching a Sybil attack in this project we also aim to disrupt the head selection algorithm of highest degree clustering protocol. We aim to introduce a malicious node into the network known as Sybil node which would slowly take over as the head of the cluster by impersonating itself. Once the Sybil node becomes the head of the cluster, it can disrupt various operations and gain unfair amount of resources which would render the network ineffectual. In this project we visualize how a MANET works and the way clusters are formed. In addition we see how the communication between the mobile devices occur and how the head of a cluster is selected. Once a MANET is established we introduce a Sybil node which would impersonate itself and unsettle the system.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectSybil attacken_US
dc.subjectAd Hoc networksen_US
dc.titleImpersonation Based Sybil attack to Disrupt the Highest Degree Clustering Algorithm in Mobile Ad Hoc Networksen_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.