{"title":"基于接收信号功率的基于样条曲线的自组网信号检测性能分析","authors":"Aditi Paul, Somnath Sinha","doi":"10.1504/IJMNDI.2017.10010152","DOIUrl":null,"url":null,"abstract":"Detection of Sybil attack in mobile ad hoc network (MANET) has been a serious issue. A legitimate node, in general, varies its transmission power within a threshold limit. A Sybil attacker can create multiple forged identities having transmission power higher than that of the legitimate nodes. This article focuses on the performance analysis of the Sybil detection technique based on received signal power. Here, we propose the concept of a Sybil detection method for a specific category of Sybil attack where the attacker changes its transmission power along with IDs time to time. To distinguish between a legitimate node and a Sybil node, we calculate received signal power (RSP) of some initially suspected nodes for a number of time instances and draw cubic Bezier curve with these values. By using tangent properties of Bezier curve, we finally trace out Sybil nodes from the suspected nodes and represent them both graphically and mathematically. We analyse the result of each step of the proposed method throug...","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"7 1","pages":"222"},"PeriodicalIF":0.0000,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Performance analysis of received signal power-based Sybil detection in MANET using spline curve\",\"authors\":\"Aditi Paul, Somnath Sinha\",\"doi\":\"10.1504/IJMNDI.2017.10010152\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Detection of Sybil attack in mobile ad hoc network (MANET) has been a serious issue. A legitimate node, in general, varies its transmission power within a threshold limit. A Sybil attacker can create multiple forged identities having transmission power higher than that of the legitimate nodes. This article focuses on the performance analysis of the Sybil detection technique based on received signal power. Here, we propose the concept of a Sybil detection method for a specific category of Sybil attack where the attacker changes its transmission power along with IDs time to time. To distinguish between a legitimate node and a Sybil node, we calculate received signal power (RSP) of some initially suspected nodes for a number of time instances and draw cubic Bezier curve with these values. By using tangent properties of Bezier curve, we finally trace out Sybil nodes from the suspected nodes and represent them both graphically and mathematically. We analyse the result of each step of the proposed method throug...\",\"PeriodicalId\":35022,\"journal\":{\"name\":\"International Journal of Mobile Network Design and Innovation\",\"volume\":\"7 1\",\"pages\":\"222\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Mobile Network Design and Innovation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJMNDI.2017.10010152\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Business, Management and Accounting\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Mobile Network Design and Innovation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJMNDI.2017.10010152","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Business, Management and Accounting","Score":null,"Total":0}
Performance analysis of received signal power-based Sybil detection in MANET using spline curve
Detection of Sybil attack in mobile ad hoc network (MANET) has been a serious issue. A legitimate node, in general, varies its transmission power within a threshold limit. A Sybil attacker can create multiple forged identities having transmission power higher than that of the legitimate nodes. This article focuses on the performance analysis of the Sybil detection technique based on received signal power. Here, we propose the concept of a Sybil detection method for a specific category of Sybil attack where the attacker changes its transmission power along with IDs time to time. To distinguish between a legitimate node and a Sybil node, we calculate received signal power (RSP) of some initially suspected nodes for a number of time instances and draw cubic Bezier curve with these values. By using tangent properties of Bezier curve, we finally trace out Sybil nodes from the suspected nodes and represent them both graphically and mathematically. We analyse the result of each step of the proposed method throug...
期刊介绍:
The IJMNDI addresses the state-of-the-art in computerisation for the deployment and operation of current and future wireless networks. Following the trend in many other engineering disciplines, intelligent and automatic computer software has become the critical factor for obtaining high performance network solutions that meet the objectives of both the network subscriber and operator. Characteristically, high performance and innovative techniques are required to address computationally intensive radio engineering planning problems while providing optimised solutions and knowledge which will enhance the deployment and operation of expensive wireless resources.