Mobile ad-hoc network (MANET) is a self-governing network that comprises of several nodes and also these specific nodes utilizes wireless links to interconnect through each former network. The structureless characterstics of MANET makes it vulnerable to various attacks. Any decentralized distributed network is particularly vulnerable to the Sybil attack wherein a malicious node masquerades as several variety of nodes, entitled as Sybil nodes, instantaneously in an endeavor to disrupt the proper functioning of the system. Such type of attacks may become reason for the impairment on an honestly large scale especially since they are difficult to detect and there has been no universally accepted scheme to counter them as yet. Defending against Sybil attacks is reasonably stimulating. In this paper, we discuss the different previous existing techniques to detect Sybil attacks.
J. R. Douceur, The Sybil attack, In Proceedings for the First International Workshop on Peer-to-Peer Systems (IPTPS’02), ser. LNCS, vol. 2429. Cambridge, MA, USA: Springer, Mar. 2002, pp. 251–260.
J. Newsome, E. Shi, D. Song, and A. Perrig. The Sybil attack in sensor networks: analysis & defences, In Proceedings of the third international symposium on Information processing in sensor networks, pages 259–268, 2004.
B. N. Levine, C. Shields, and N. B. Margolin, A survey of solutions to the Sybil attack, University of Massachusetts Amherst, Amherst, MA, 2006.
Margolin, N. Boris, and Levine, Brian Neil, Informant: Detecting Sybils using incentives, In Proceedings of Financial Cryptography (FC) (February 2007) pp. 192—207.
Tangpong, A. , Kesidis, G. , Hung-yuan Hsu, Hurson, A., Robust Sybil Detection for MANETs, In Proceedings of 18th International Conference on Computer Communications and Networks, 2009. ICCCN 2009, pp. 1 – 6.
Murat Demirbas, Youngwhan Song, An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks, In Proceedings of WoWMoM 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2006. 5 pp. – 570.
W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In ACM CCS 2003, pages 42–51, Oct. 2003.
Diogo Monica, Thwarting The Sybil Attack in Wireless Ad Hoc Networks, Master’s Thesis at the Universidade Tecninca de Lisboa, July 2009.
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedhia, Nirali Mody, Sugata Sanyal, Ajith Abraham, A Distributed Security Scheme for Ad Hoc Networks, ACM Crossroads, Special Issue on Computer Security. Volume 11, No. 1, September, 2004.
P.W. L. Fong. Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems. In IEEE Symposium on Security & Privacy, 2011 pp. 263-278.
CAO, Q., SIRIVIANOS, M., YANG, X., AND PREGUEIRO, T., Aiding the detection of fake accounts in large scale social online services, In Proc. of NSDI (2012).
C. E. Gates, Access control requirements for Web 2.0 security and privacy, in IEEE Web 2.0 privacy and security workshop (W2SP’07), Oakland, California, USA, May 2007.
B. Carminati and E. Ferrari, Enforcing relationships privacy through collaborative access control in web-based social networks, In Proceedings of the 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing CollaborateCom’09), Washington DC, USA, Nov. 2009 pp. 1-9, 2009sss.
Security, Sybil attack, MANETs, Ad-hoc network.