What is Sybil Attack in Wireless Networks
Networking , Technology & Science / March 7, 2018

Wireless networking is inherently insecure. Wireless technologies, in the simplest sense, enable one or more devices to communicate without physical connections without requiring network or peripheral cabling. Security in computer world determines the ability of the system to manage, protect and distribute sensitive information. An ever-existing concern is the lack of security due to the very fact that the technology is wireless and is vulnerable to security threats & attacks. Many security mechanisms are based on specific assumptions of identity and are vulnerable to attacks when these assumptions are violated. Overview of Sybil Attack The Sybil attack in computer security is an attack wherein a reputation system is subverted by forging identities in peer-to-peer networks. A Sybil attack is one in which a malicious node on a network illegitimately claims to be several different nodes simultaneously. If an entity on a network does not have physical knowledge of the other entities, it will perceive them purely as informational abstractions called identities. . By illegitimately infusing false or biased information via the pseudonymous identities, an adversary can mislead a system into making decisions benefiting herself The term Sybil attack is to denote an attack where the attacker (Sybil node) tries to…

WormHole Attack in MANET
Networking , Technology & Science / August 19, 2017

A wireless ad-hoc network is temporarily set network by wireless mobile computers moving arbitrary in the place that have no fixed infrastructure and all of the transmission links are established through wireless medium. MANETs are a kind of wireless ad-hoc network. Each node in a MANET is free to move independently in any direction leads to changing its links to other nodes frequently. Each node operates as an end system and also as a router to forward packets. The primary challenge in building a MANET is equipping each node to continuously maintain the information required to properly route traffic. Wireless ad-hoc network is promising in solving many challenging real-world problems like military field operation, communication in emergency response system and oil drilling and mining operation. Wireless mobile ad-hoc networks are vulnerable to many security attacks because of shared channel, insecure operating environment, lack of central authority, limited resource availability, dynamically changing network topology, resource constraints. MANET’s open issues are like security problem, finite transmission bandwidth, abusive broadcasting messages, reliable data delivery, dynamic link establishment and restricted hardware caused processing capabilities emerges into new horizon of different research areas. Wormhole Attack In MANETs, each node communicates directly with its neighboring nodes…

Insert math as
Block
Inline
Additional settings
Formula color
Text color
#333333
Type math using LaTeX
Preview
\({}\)
Nothing to preview
Insert