Sie sind auf Seite 1von 2

What is Sybil Attack?

In an Network a malicious node illegitimately claims to have multiple identities on a single


physical device is known as Sybil Attack.If an entity on a network does not have physical
knowledge of the other entities, it will perceive them purely as informational abstractions called
identities.We have successfully delivered more than 75+ Sybil attack in ns2 Project to
B.E/B.Tech/M.E/M.Tech and PhD Scholars.Sybil Attack can be prevented using various
algorithm and can be simulated using ns2.To Simulate Sybil Attack in ns2 , we need to find
malicious node.

Types of Sybil attack in Manet:

Simultaneous Sybil attack.

join and leave Sybil attack.

Detection mechanisms involved in Manet:

request threshold validation mechanism.

trusted certification.

hashing function.

incentive-based detection.

location/position verification.

random key predistribution.

RSSI-based scheme etc.

Malicious applications of Sybil attack:

Data aggregation.

Routing.

Distributed storage.

Fair resource allocation.

Tampering with voting and reputation systems .

Das könnte Ihnen auch gefallen