General Information
    • ISSN: 1793-8201 (Print), 2972-4511 (Online)
    • Abbreviated Title: Int. J. Comput. Theory Eng.
    • Frequency: Quarterly
    • DOI: 10.7763/IJCTE
    • Editor-in-Chief: Prof. Mehmet Sahinoglu
    • Associate Editor-in-Chief: Assoc. Prof. Alberto Arteta, Assoc. Prof. Engin Maşazade
    • Managing Editor: Ms. Cecilia Xie
    • Abstracting/Indexing: Scopus (Since 2022), INSPEC (IET), CNKI,  Google Scholar, EBSCO, etc.
    • Average Days from Submission to Acceptance: 192 days
    • APC: 800 USD
    • E-mail: editor@ijcte.org
    • Journal Metrics:
    • SCImago Journal & Country Rank
Article Metrics in Dimensions

IJCTE 2010 Vol.2(5): 760-767 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2010.V2.238

Incrimination Immune Method (I2M) – A Novel Messaging Technique To Combat Sybil Attack In Ad Hoc Network

N. Sreenath, S. Vijayalakshmi, P. Annadurai

Abstract—Ad hoc networks are an emerging area of mobile computing and efficient paradigm for infrastructure less communication. This paper analyzes the impact of Sybil attack with Incrimination Immune Method (I2M). Sybil attack illegally claims/forges the identities of other genuine nodes in ad hoc network. The Master Sybil node maintains pool of subverted shadow identities which misuses them to disrupt the routing process. A malicious node incriminating or impersonating the other innocent nodes is defined as an entrap attack which forms a part of Sybil attack. The concept of Neighbor Aware Multicast Routing Protocol (NAMP) is deployed which warrants the creation of primary and secondary forwarding list. This idea has substantially helped the ad hoc network to be resilient to Sybil attack where a subverted node in the primary list disrupting the communication is blacklisted by the sender after receiving a threshold number of Node Accusation Report (NAR) from the genuine receivers which has bore the brunt of non receipt of packets. Consequently the Master Sybil node realizing the triviality of the shadow identities release them. These freed Sybil nodes jointly sends a unique novel message called Unleashed Sybil Incriminated Node Consensus Penalization (USINCP) to the sender in spotting the master Sybil adversary. This messaging technique is initiated only on demand (ie. When there is a Sybil attack) so it incurs less overhead and minimal memory requirements besides boosting the network performance. Two graphs have been theoretically conceived to study the effect of this messaging technique by plotting the number of groups with multicast members in x axis and end-to-end delay in y axis.

Index Terms—Ad hoc Network, NAMP, Node Accusation Report, Sybil Attack.

F. N. Sreenath is with Pondicherry Engineering College, Pondicherry (e-mail: nsreenath@pec.edu).
S. S. Vijayalakshmi is with Pondicherry University, Pondicherry. She is now with the Department of Banking Technology. (Corresponding author Phone no: 9894597730; e-mail: anviji_lakshmi@yahoo.co.in).
T. P. Annadurai is with Kanchi Mamunivar College of Post Graduate Studies, Pondicherry (e-mail: annadurai_aps70@yahoo.com).

[PDF]

Cite: N. Sreenath, S. Vijayalakshmi and P. Annadurai, "Incrimination Immune Method (I2M) – A Novel Messaging Technique To Combat Sybil Attack In Ad Hoc Network," International Journal of Computer Theory and Engineering vol. 2, no. 5, pp. 760-767, 2010.  


Copyright © 2008-2024. International Association of Computer Science and Information Technology. All rights reserved.