SLGP Header


IJCSEC Front Page

In adhoc network is the major problem for providing security in the network. For servers, there is no infrastructure A network connection established for a single session and cannot require a router or a wireless base station in computer networking. An adhoc network is created for a specific purpose and adhoc network is a temporary network connection (such as data transferring from one node to another). It is used to without loss of data and to enhance security. Sybil attack, in which an attacker manages and control to more than one identity on a single device. It is strongly desirable to detect and prevent a Sybil attack and eliminate them from the network. In this paper, Sybil attack can detect and prevent from the attackers. It can detect and prevent the information from sender to receiver without loss of information using Neighbor discover distance (NDD) algorithm. An NDD algorithm detects neighbor node and act as a server to send information to destination. In this method passive adhoc identity method and key distribution are used. Detection can be done by a single node or multiple nodes can join to improve the accuracy of detection. It can be used to secure and avoid attacking the system on the network.
Index Terms: Sybil attack, Neighbor discovers the distance (NDD), adhoc network
Adhoc networks represent distributed systems. Adhoc network consist of wireless mobile nodes that can freely selforganize into arbitrary and temporary. The unique characteristics of Adhoc networks, such as dynamic topology and constraint devices, number of nontrivial challenges for efficient and lightweight security protocols. A Centralized identity management in Adhoc network and requirement of a unique, distinct, and persistent identity for their security protocols. A Sybil attacker can damage to the Mobile adhoc networks in several ways. For example, an attacker can disrupt multipath routing or location-based by participating in the routing, giving the false impression of being distinct nodes at different node-disjoint paths. At the same time attacker can use the different identities. A single attacker could pretend nodes to report the existence of a false bottleneck in traffic. Adhoc network is mainly used to gather sensitive information about mobile nodes. To relate between a source and its destination, effect on data and transmission time on the network. A end-to-end network is a piece of software. It can access only local resources. An entity on the end-to-end network by presenting an identity. A more than one entity can correspond to a single entity. Basically, the mapping of identities to entities is many to one. In this type of networks use multiple identities, Such as redundancy, resource sharing and integrity. Adhoc network is the evolving wireless communications. Self organized ad hoc networks by PDAs or laptops. Its use in conference, disaster relief and battlefield environments. The traditional problems of adhoc network are power control, transmission-quality enhancement.


  1. Sohail Abbas, MSdjid. David Llewellyn-jones, and Kashif kifayat, “ Lightweight Sybil Attack Detection in MANETs”, IEEE SYSTEM JOURNAL, VOL.7,NO.2,JUNE 2013.
  2. J.R.Douceur, “The Sybil attack, “ presented at the Revised paper from the First Int. Workshop on Peer-toPeer Systems, 2002 , pp.251-260.
  3. I.Chlamtac, M.Conti, and J.J.-N.Liu, “Mobile ad hoc networking : Imperatives and challenges,” Ad Hoc Netw., vol. 1, no. 1 , pp. 13-64, 2003.
  4. N. B. Margolin and B. N. Levine. Quantifying sybil attacks againstnetwork applications. Technical Report 67, Dept. of Com. Sci., U. MassAmherst, Dec. 2005.
  5. SaroshHashmi, John Brooke,``Towards Sybil Resistant Authentication in Mobile Ad-hoc Networks “FourthInternational Conference on Emerging Security Information,System and Technologies, pp.17-24, 2010.
  6. SaroshHashmi, John Brooke,``Authentication Mechanisms for Mobile Ad-hoc Networks and Resistance to Sybil Attack '' The Second International Conference on Emerging Security Information,System and Technologies, pp.120-126, 2008.
  7. J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis &defenses," in Proceedings of the third international symposium on Information processing in sensor networks. Berkeley, California, USA: ACM, 2004.
  8. C. Piro, C. Shields, and B. N. Levine, “Detecting the Sybil attack in mobile ad hoc networks,” in ProcSecurecomm Workshops, pp.1–11,2006.
  9. HongboZhuo,``Secure Prophet Address Allocation for Mobile Ad-hoc Networks'' IFIP International Conference on Network and Parallel Computing, pp.60-67, 2008.
  10. P. Traynor, H. Choi, G. Cao, S. Zhu, and T. La Porta.Establishing pair-wise keys in heterogeneous sensor networks. In Proc. IEEE INFOCOM,Apr, 2006.
  11. J. Newsome, E. Shi, D. Song, and A Perrig. The sybil attack in sensor networks : Analysis &defenses. In Proc. IPSN’04, Berkeley, Apr. 2004.
  12. N. Margolin and B. Levine. Informant: Detecting sybils using incentives.Financial Cryptography, Feb. 2007.
  13. Q. Zhang, P. Wang, D. S. Reeves, and P. Ning.Defending against Sybil attacks in sensor networks.In Proc. IEEE ICDCS, June 2005.
  14. AthichartTangpong, George Kesidis, Hung-yuanHsu,AliHurson,``Robust Sybil Detection for MANETs '' IEEE, 2009.
  15. Jin-HeeCho,AnanthramSwami,andIng-Ray Chen,``A Survey on Trust Management for Mobile Ad Hoc Networks for Mobile Ad-Hoc Networks,'' IEEE Communication Surveys & Tutorials, Vol.13, No.4, pp.562-583, 2011.