Preserving against Sybil Attack in Mobile Ad Hoc Network Using SYDECT Algorithm
Bindu Chaurasiya,  Mohit Shrivastav,  Devendra Kumar
MANET is a kind of wireless network which is decentralized in nature and comprise of moving mobile nodes. Due to changing topology of such network it impose critical security protocol design against harmful attacks such as Sybil Attack. In a Sybil attack a malicious node can produce and manage a large number of logical identities on a single physical device. This gives the misapprehension to the network as if it were different rightful nodes. Sybil attacker node’s additional identities are known as Sybil nodes. In this research work, a novel method is proposed to detect and eliminate Sybil attack; we named it as SYDECT algorithm. Proposed algorithm takes use of the Digital signature which ensures data authenticity and integrity, so no loss of information is ensured. A Sybil attack is detected and eliminated from the network dynamically and hence improves the network capabilities to perform well. The simulations and experiments would be carried out using Network simulator 2 taking varying number of nodes according to nodes velocity. Performance of network would be evaluated with respect to parameters like Average Throughput, Average Delay, Packet Delivery ratio (PDR) and Normalized Routing Load (NRL) under three MANET protocol namely DSR, AODV and AOMDV routing protocols. Further experiment is conducted to verify the efficiency of SYDECT algorithm based on parameters like Detection rate, True positive rate and false positive rate in MANET environment.
Unique Identification Number - IJEDR1602128Page Number(s) - 726-733Pubished in - Volume 4 | Issue 2 | May 2016DOI (Digital Object Identifier) -    Publisher - IJEDR (ISSN - 2321-9939)
Cite this Article
Bindu Chaurasiya,  Mohit Shrivastav,  Devendra Kumar,   "Preserving against Sybil Attack in Mobile Ad Hoc Network Using SYDECT Algorithm"
, International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.4, Issue 2, pp.726-733, May 2016, Available at :http://www.ijedr.org/papers/IJEDR1602128.pdf