DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
1.
2. AIM OF THE PROJECT
To Detect The New Identities Of Sybil Attackers Using
Centralized Base Station and without Any Extra
Hardware, Such As Directional Antennae Or A
Geographical Positioning System(GPS).
It is able to demonstrate that the proposed scheme detects
Sybil identities with good accuracy even in the presence
of mobility.
3. A Sybil attacker can either create more than one identity on a single
physical device in order to launch a coordinated attack on the network.
DISADVANTAGES
Overhead of packet loss.
Low level network performance.
PROPOSED SYSTEM
hackers cannot act as source, because one centralized server is
maintaining to check authentication of source.
Our proposed system used the NDD (Neighbor discover distance)
Algorithm.
ADVANTAGES
To reduce the packet delay and detect the attacker.
Data delivery quickly from source to destination.
Efficient data transmission on network.
Without any loss data will be send in destination.
4. MODULES:-
1.WIRELESS NETWORK CONFIGURATION SETTING
It request the ip address of source ,selecting the path, then
attach the file which we want to send and finally request ip
address of the destination.
2.TOPOLOGY DESIGN
In topology design all nodes are placed at the particular
distance from each other.
3.NEIGHBOR DISCOVERY DISTANCE
Each node should know the address of their neighbor nodes.
4.SYBILATTACK
It create more than one identity of a single physical device
in order to weaken the detection process.
5. 1.WIRELESS NETWORK CONFIGURATION SETTING
First the system request the ip address of source node.
Then select the path in which node we are sending the
packets.
Now the system requests the ip address of destination
node.
Source node will decide the path according to the
Received signal strength(RSS).
Finally the secure communication takes places.
6.
7.
8.
9. 2.TOPOLOGY DESIGN
In Topology design all node place at particular distance.
The sink hole is at the center of the circular sensing area.
Sink hole only decide the path for the packet transmission.
Based on the energy level the sink node will decide the
trusted or untrusted node.
It allow the quick data transmission from source to
destination based on energy level of nodes.
10.
11. 3.NEIGHBOR DISCOVERY DISTANCE(NDD)
NDD is the process which determines the total number
and identity of other nodes in its neighbour.
It is a fundamental building block of many protocols
including localization routing and group management.
Neighbour discovery is especially important to the proper
functioning of wireless networks.
It may cooperate in the performance of various tasks
including communications, sensing and localization.
Each node will know the address of their neighbor nodes.
12.
13. 4.SYBILATTACK
It create more than one identity of a single physical device
in order to weaken the detection process.
A single attacker could pretend nodes to report the
existence of a false bottleneck in traffic.
MANETs are mainly related to illegally gathering
sensitive information about mobile nodes.
To relate between a source and its destination, effect on
data and transmission time on network.
14.
15. CONCLUSION
We also showed the various factors affecting the detection
accuracy, such as network connections, packet
transmission rates, node density, and node speed.
The simulation results showed that our scheme works
better even in mobile environments and can detect both
join-and-leave and simultaneous Sybil attackers with a
high degree of accuracy.
FUTURE ENHANCEMENT
Our future work includes tackling issues related to
variable transmit powers and masquerading attacks in the
network.