{"title":"Unmasking non-simultaneous sybils in mobile opportunistic networks","authors":"Parmeet Kaur, S. Mittal","doi":"10.1109/IC3.2016.7880235","DOIUrl":null,"url":null,"abstract":"Mobile opportunistic networks allow nodes to freely join and leave the network; hence they are highly susceptible to security threats. The paper proposes a method for detection and avoidance of a non-simultaneous Sybil attack in mobile opportunistic networks. In this attack, a malicious node assumes multiple, fake identities (i.e. Sybils) over a period of time to remain active in the network even after it has been detected as malicious. These Sybils may deplete the network resources or bias recommendation and voting systems. The proposed Sybil detection and avoidance methodology has been simulated using the opportunistic network simulator, ONE. The simulation results show that the proposed technique achieves a higher probability of packet delivery and reduces the average latency, overhead and the number of aborted message transmissions in networks with varying number of malicious nodes as compared to the case when no Sybil detection method is used.","PeriodicalId":294210,"journal":{"name":"2016 Ninth International Conference on Contemporary Computing (IC3)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Ninth International Conference on Contemporary Computing (IC3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3.2016.7880235","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Mobile opportunistic networks allow nodes to freely join and leave the network; hence they are highly susceptible to security threats. The paper proposes a method for detection and avoidance of a non-simultaneous Sybil attack in mobile opportunistic networks. In this attack, a malicious node assumes multiple, fake identities (i.e. Sybils) over a period of time to remain active in the network even after it has been detected as malicious. These Sybils may deplete the network resources or bias recommendation and voting systems. The proposed Sybil detection and avoidance methodology has been simulated using the opportunistic network simulator, ONE. The simulation results show that the proposed technique achieves a higher probability of packet delivery and reduces the average latency, overhead and the number of aborted message transmissions in networks with varying number of malicious nodes as compared to the case when no Sybil detection method is used.