Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7355
Title: Impersonation Based Sybil attack to Disrupt the Lowest ID Clustering algorithm in Mobile AD HOC Networks
Authors: Sharma, Rupali
Vasudeva, Amol [Guided by]
Keywords: Sybil attack
Ad Hoc networks
Issue Date: 2016
Publisher: Jaypee University of Information Technology, Solan, H.P.
Abstract: A Mobile ad-hoc network is a self-configuring network that does not depend on any infrastructure for communication. Every node is free to move anywhere in the network and data is exchanged independently across the network. Network security in an MANET is a very challenging issue. Open nature communication of MANET makes it more vulnerable to security attacks. Our major focus in the project will be impersonation of Sybil Attack, in which a malicious node illegitimately claims multiple identities. This attack can disrupt various operations of the mobile ad hoc networks for Example, voting, fair resource allocation scheme, Detection and routing mechanisms etc. In addition to these the Sybil attack can also disrupt the head selection mechanism of the lowest ID cluster-based routing protocol.
URI: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7355
Appears in Collections:B.Tech. Project Reports



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.