Authentication mechanisms for mobile Ad-hoc networks and resistance to sybil attack

Sarosh Hashmi, John Brooke

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In Sybil attack, an attacker acquires multiple identities and uses them simultaneously or one by one to attack various operation of the network. Such attacks pose a serious threat to the security of self-organized networks like mobile ad-hoc networks (MANETs) that require unique and unchangeable identity per node for detecting routing misbehavior and reliable computation of node's reputation. The purpose of this paper is to analyze the effectiveness of current authentication mechanism for MANETs in coping with the Sybil attack, the infrastructure requirement posed by these mechanisms and applicability of these mechanisms to different kinds of ad hoc networks. We identify open research issues that need to be addressed by the next generation of authentication mechanisms for MANETs. © 2008 IEEE.
Original languageEnglish
Title of host publicationProceedings - 2nd Int. Conf. Emerging Security Inf., Systems and Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on Dependability and Security in Complex and Critical Inf. Sys.|Int. Conf. Emerg. Secur. Inf., Syst. Technol., SECURWARE, Incl. DEPEND: Int. Workshop Dependability Secur. Complex Crit. Inf.
Pages120-126
Number of pages6
DOIs
Publication statusPublished - 2008
Event2nd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008 - Cap Esterel
Duration: 1 Jul 2008 → …

Conference

Conference2nd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008
CityCap Esterel
Period1/07/08 → …

Keywords

  • MANET
  • Sybil attack resistance
  • authentication mechanism
  • mobile ad-hoc network
  • node routing misbehavior detection
  • self-organized network security
  • ad hoc networks
  • message authentication
  • mobile radio
  • telecommunication network routing
  • telecommunication security

Fingerprint

Dive into the research topics of 'Authentication mechanisms for mobile Ad-hoc networks and resistance to sybil attack'. Together they form a unique fingerprint.

Cite this