Sybil Attack on Lowest ID Clustering Algorithm in the Mobile Ad Hoc Network

It is quite a challenging task to achieve security in a mobile ad hoc network because of its open nature, dynamically changing topology, lack of infrastructure and central management. A particular harmful attack that takes the advantage of these characteristics is the Sybil attack, in which a malicious node illegitimately claims multiple identities. This attack can exceedingly disrupt various operations of the mobile ad hoc networks such as data aggregation, voting, fair resource allocation scheme, misbehavior detection and routing mechanisms etc.

Provided by: Academy & Industry Research Collaboration Center Topic: Mobility Date Added: Sep 2012 Format: PDF

Find By Topic