Detection Techniques for Sybil Attack in MANETs
Downloads
For detection of a Sybil attack, a traditional method defenses against attacks rely on trusted identities provided by a certification authority, but requiring users to present trusted identities run counter to the open membership that underlies the success of these distributed systems in the first place, but this approach is not suitable for mobile ad hoc networks because it usually requires costly initial setup and incurs overhead related to maintaining and distributing cryptographic keys. There are also two other approaches to detect the Sybil attack, one is Lightweight Sybil Attack Detection Approach and other is Robust Sybil Attack Detection Approach. Also some other techniques are discussed in research paper.