Sybil Attack Detection Based on Authentication Process Using Digital Security Certificate Procedure for Data Transmission in MANET


  • P Muthusamy
  • T Sheela





Digital security certificate, route discovery, an authentication process, attack detection, sybil attack, MANET.


Mobile devices are becoming very popular due to the wide range of networking competence for the mobile device users. The security issues in MANET become the control towards the management of the multiple numbers of nodes in the MANET is distributed. To strategy for overcome the Sybil attack in MANET and improve the efficiency of the Sybil attack detection by enhancing the data confidentiality and reliability. The primary objective of this research work is to develop a scheme to detect and prevent the Sybil attack in the MANET and to provide a highly reliable data transmission approach. The proposed system ensures the availability, confidentiality, authenticity and reliability of the information using digital certificate chains and secret sharing schemes. To detect the sybil node during the route discovery process, the nodes authenticate each other by providing the digital security certificate (DSC). The digital security certificate proves the nodes and allows only authorized node to participate in the route to transmit the data packets from the source to destination. It will not ensure the confidential data transmission when the legitimate node exhibits the malicious behavior in certain circumstances. When any intermediate nodes learn about the data packet that is being transmitted, then the security in data transmission becomes a critical factor. The safety of the network can be enhanced by preventing the sybil attack in MANET by increasing the data confidentiality and reliability.  Only certified and authenticated nodes can participate in the route to transfer the data packets between the nodes. To prevent the sybil attack, it is necessary to secure the data that is transmitted over the insecure communication routes. 




[1] Alimohammadi M & Pouyan AA, “Sybil attack detection using a low cost short group signature in VANETâ€, IEEE 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC), (2015), pp.23-28.

[2] Bhumkar R & Pete DJ, “Reduction of error rate in Sybil attack detection for MANETâ€, IEEE 9th International Conference on Intelligent Systems and Control (ISCO), (2015), pp.1-6.

[3] Gu P, Khatoun R, Begriche Y & Serhrouchni A, “Vehicle driving pattern based sybil attack detectionâ€, High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), IEEE 18th International Conference on, (2016), pp.1282-1288.

[4] John R, Cherian JP & Kizhakkethottam JJ, “A survey of techniques to prevent sybil attacksâ€, IEEE International Conference on Soft-Computing and Networks Security (ICSNS), (2015), pp.1-6.

[5] Kumar PV & Maheshwari M, “Prevention of Sybil attack and priority batch verification in VANETsâ€, IEEE International Conference on Information Communication and Embedded Systems (ICICES), (2014), pp.1-5.

[6] Lakhanpal R & Sharma S, “Detection & Prevention of Sybil attack in Ad hoc network using hybrid MAP & MAC techniqueâ€, IEEE International Conference on Computation of Power, Energy Information and Communication (ICCPEIC), (2016), pp.283-287.

[7] Li P & Lu R, “A sybil attack detection scheme for privacy-preserving mobile social networksâ€, IEEE 10th International Conference on Information, Communications and Signal Processing (ICICS), (2015), pp. 1-5.

[8] Liu R & Wang Y, “A new sybil attack detection for wireless body sensor networkâ€, IEEE Tenth International Conference on Computational Intelligence and Security (CIS), (2014), pp.367-370.

[9] Mekliche K & Moussaoui S, “L-P2DSA: Location-based privacy-preserving detection of Sybil attacksâ€, IEEE 11th International Symposium on Programming and Systems (ISPS), (2013), pp.187-192.

[10] Mulla M and Sambare, S, “Efficient analysis of lightweight Sybil attack detection scheme in Mobile Ad hoc Networksâ€, IEEE International Conference on Pervasive Computing (ICPC), (2015), pp.1-6.

[11] Rashidibajgan S, “A trust structure for detection of sybil attacks in opportunistic networksâ€, IEEE 11th International Conference for Internet Technology and Secured Transactions (ICITST), (2016), pp.347-351.

[12] Samuel SJ & Dhivya B, “An efficient technique to detect and prevent Sybil attacks in social network applicationsâ€, IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), (2015), 1-3.

[13] Sharma H & Garg R, “Enhanced lightweight sybil attack detection techniqueâ€, IEEE 5th International Conference on the Next Generation Information Technology Summit (Confluence), (2014), pp.476-481.

[14] Sharma AK, Saroj SK, Chauhan SK & Saini SK, “Sybil attack prevention and detection in vehicular ad hoc networkâ€, IEEE International Conference on Computing, Communication and Automation (ICCCA), (2016), pp.594-599.

[15] Shrestha R, Djuraev S & Nam SY, “Sybil attack detection in vehicular network based on received signal strengthâ€, IEEE International Conference on Connected Vehicles and Expo (ICCVE), (2014), pp.745-746.

[16] Tian B, Yao Y, Shi L, Shao S, Liu Z & Xu C, “A novel Sybil attack detection scheme for wireless sensor networkâ€, IEEE 5th IEEE International Conference on Broadband Network & Multimedia Technology (IC-BNMT), (2013), pp.294-297.

[17] Triki B, Rekhis S, Chammem M & Boudriga, N, “A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networksâ€, IEEE 6th Joint IFIP Conference on Wireless and Mobile Networking (WMNC),(2013), pp.1-8.

[18] Triki B, Rekhis S & Boudriga N, “An RFID based system for the detection of Sybil attack in military wireless sensor networksâ€, IEEE World Congress on Computer Applications and Information Systems (WCCAIS), (2014), pp.1-2.

[19] Valarmathi ML, Meenakowshalya A & Bharathi A, “Robust Sybil attack detection mechanism for Social Networks-a surveyâ€, IEEE 3rd International Conference on Advanced Computing and Communication Systems (ICACCS), (2016), pp.1-5.

[20] Vamsi PR & Kant K, “A lightweight sybil attack detection framework for wireless sensor networksâ€, IEEE Seventh International conference on Contemporary computing (IC3), (2014), pp.387-393.

[21] G, Abikhanova, A Ahmetbekova, E Bayat, A Donbaeva, G Burkitbay (2018). International motifs and plots in the Kazakh epics in China (on the materials of the Kazakh epics in China), Opción, Año 33, No. 85. 20-43.

[22] A Mukanbetkaliyev, S Amandykova, Y Zhambayev, Z Duskaziyeva, A Alimbetova (2018). The aspects of legal regulation on staffing of procuratorial authorities of the Russian Federation and the Republic of Kazakhstan Opción, Año 33. 187-216.

View Full Article: