Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7354
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Prakash, Prem | - |
dc.contributor.author | Vasudeva, Amol [Guided by] | - |
dc.date.accessioned | 2022-10-07T06:51:29Z | - |
dc.date.available | 2022-10-07T06:51:29Z | - |
dc.date.issued | 2016 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7354 | - |
dc.description.abstract | Mobile ad hoc networks (MANET) is a self-configuring and infrastructure-less network of mobile devices. Since the topology of this network is dynamically changing and there is no central management so it becomes difficult to implement security and this gives an opportunity to intrude into the network and exploit the weaknesses of the same. Sybil attack is one such attack which takes the advantage of characteristics of MANET and disrupts the network. In a Sybil attack malicious node illegitimately claims multiple identities. This attack has the ability to seriously disrupt various operations like data aggregation, voting, fair resource allocation scheme, misbehavior detection and routing mechanisms etc. In addition to launching a Sybil attack in this project we also aim to disrupt the head selection algorithm of highest degree clustering protocol. We aim to introduce a malicious node into the network known as Sybil node which would slowly take over as the head of the cluster by impersonating itself. Once the Sybil node becomes the head of the cluster, it can disrupt various operations and gain unfair amount of resources which would render the network ineffectual. In this project we visualize how a MANET works and the way clusters are formed. In addition we see how the communication between the mobile devices occur and how the head of a cluster is selected. Once a MANET is established we introduce a Sybil node which would impersonate itself and unsettle the system. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Sybil attack | en_US |
dc.subject | Ad Hoc networks | en_US |
dc.title | Impersonation Based Sybil attack to Disrupt the Highest Degree Clustering Algorithm in Mobile Ad Hoc Networks | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Impersonation Based Sybil attack to Disrupt the Highest Degree Clustering Algorithm in Mobile Ad Hoc Networks.pdf | 2.33 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.