Prevention Techniques for Sybil Attack

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 11, Issue 10

Abstract

Mobile ad-hoc network is a self-governing network, consists of group of nodes that communicates with each other through wireless links. As it is a wireless network, so it is subjected to various attacks. There is one attack which is very dangerous called Sybil attack. In Sybil attack, attackers or malicious nodes uses multiple identities to disrupt the communication between the nodes by capturing necessary and important information and creating misunderstandings between the nodes. In this paper some measures are described to prevent Sybil attack.

Authors and Affiliations

Roopali Garg, Himika Sharma

Keywords

Related Articles

A TABU SEARCH APPROACH FOR THE BI-OBJECTIVE HOSPITAL SITE DETERMINATION PROBLEM UNDER FUZZY ENVIRONMENT

The present paper attempts to study the bi-objective hospital site determination problem under fuzzy environment. In this paper, the concept of Tabu search is used for solving bi-objective facility location problem i.e....

Study of Effect of Variations in slot dimensions on Fractal Patch antenna Performance

An antenna is a device that is made to efficiently radiate and receive radiated Electromagnetic waves. Microstrip antennas are attractive due to their light weight, conformability and low cost. These antennas can be inte...

Empirical and Statistical Study of Elicitation Complications

The performance of Requirement Engineering is like framework for software development process. All-inclusive software has four mainstays of requirement engineering processes i.e. Functional and non-functional requirement...

Theoretical and Computational Perspectives of Arabic Morphological Analyzers and Generators : Theoretical Survey

Morphology analysis is an essential part of most applications of natural language processing (NLP) which included different applications like Machine Translation (MT) and language rule based Information Retrieval (IR). M...

Role-Attribute-Based Encryption (RABE) Access Control for Healthcare Cloud Systems

In the medical industry, it is critical to ensure the confidentiality of patients’ personal health records when storing and managing them. Before cloud computing surfaced, heath providers used local servers and hard dr...

Download PDF file
  • EP ID EP650361
  • DOI 10.24297/ijct.v11i10.2974
  • Views 74
  • Downloads 0

How To Cite

Roopali Garg, Himika Sharma (2013). Prevention Techniques for Sybil Attack. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 11(10), 3060-3064. https://europub.co.uk./articles/-A-650361