Abstract
In Sybil attack, an attacker acquires multiple identities and uses them simultaneously or one by one to attack various operation of the network. Such attacks pose a serious threat to the security of self-organized networks like mobile ad-hoc networks (MANETs) that require unique and unchangeable identity per node for detecting routing misbehavior and reliable computation of node's reputation. The purpose of this paper is to analyze the effectiveness of current authentication mechanism for MANETs in coping with the Sybil attack, the infrastructure requirement posed by these mechanisms and applicability of these mechanisms to different kinds of ad hoc networks. We identify open research issues that need to be addressed by the next generation of authentication mechanisms for MANETs. © 2008 IEEE.
Original language | English |
---|---|
Title of host publication | Proceedings - 2nd Int. Conf. Emerging Security Inf., Systems and Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on Dependability and Security in Complex and Critical Inf. Sys.|Int. Conf. Emerg. Secur. Inf., Syst. Technol., SECURWARE, Incl. DEPEND: Int. Workshop Dependability Secur. Complex Crit. Inf. |
Pages | 120-126 |
Number of pages | 6 |
DOIs | |
Publication status | Published - 2008 |
Event | 2nd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008 - Cap Esterel Duration: 1 Jul 2008 → … |
Conference
Conference | 2nd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008 |
---|---|
City | Cap Esterel |
Period | 1/07/08 → … |
Keywords
- MANET
- Sybil attack resistance
- authentication mechanism
- mobile ad-hoc network
- node routing misbehavior detection
- self-organized network security
- ad hoc networks
- message authentication
- mobile radio
- telecommunication network routing
- telecommunication security