A Deep Study of Hybrid Trust Built To Improve Security Technique against Sybil Attack in MANET Based IoT Network
Prince Kumar1 , Rachana Kamble2
Section:Research Paper, Product Type: Journal Paper
Volume-9 ,
Issue-12 , Page no. 1-8, Dec-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i12.18
Online published on Dec 31, 2021
Copyright © Prince Kumar, Rachana Kamble . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Prince Kumar, Rachana Kamble, “A Deep Study of Hybrid Trust Built To Improve Security Technique against Sybil Attack in MANET Based IoT Network,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.12, pp.1-8, 2021.
MLA Style Citation: Prince Kumar, Rachana Kamble "A Deep Study of Hybrid Trust Built To Improve Security Technique against Sybil Attack in MANET Based IoT Network." International Journal of Computer Sciences and Engineering 9.12 (2021): 1-8.
APA Style Citation: Prince Kumar, Rachana Kamble, (2021). A Deep Study of Hybrid Trust Built To Improve Security Technique against Sybil Attack in MANET Based IoT Network. International Journal of Computer Sciences and Engineering, 9(12), 1-8.
BibTex Style Citation:
@article{Kumar_2021,
author = {Prince Kumar, Rachana Kamble},
title = {A Deep Study of Hybrid Trust Built To Improve Security Technique against Sybil Attack in MANET Based IoT Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2021},
volume = {9},
Issue = {12},
month = {12},
year = {2021},
issn = {2347-2693},
pages = {1-8},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5419},
doi = {https://doi.org/10.26438/ijcse/v9i12.18}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i12.18}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5419
TI - A Deep Study of Hybrid Trust Built To Improve Security Technique against Sybil Attack in MANET Based IoT Network
T2 - International Journal of Computer Sciences and Engineering
AU - Prince Kumar, Rachana Kamble
PY - 2021
DA - 2021/12/31
PB - IJCSE, Indore, INDIA
SP - 1-8
IS - 12
VL - 9
SN - 2347-2693
ER -
VIEWS | XML | |
358 | 418 downloads | 180 downloads |
Abstract
The location of the mobile nodes in the MANET IoT changes continuously that`s why the communication among them is difficult. The different devices or nodes in the Internet of Things (IoT) connect with each other over the internet or convey information to each other if they are immediately in range. The existence of an attacker is a difficult issue in a network since it lowers routing performance and has an impact on node battery life. Secure routing is critical to the adoption and deployment of many IoT applications. Sybil attacks may be destructive to MANET IoT and constitute a significant problem for building effective IoT security solutions. In this dissertation, proposes the Hybrid trust based enhanced security technique to protect the MANET IoT network against Sybil Attack. The preceding Sec Trust method is recommended as a dependable approach in IoT to safeguard communication from Sybil attack. The proposed system also decreases energy usage, which increases network life time. The performance of both the schemes is measured in different node density situations, but Hybrid trust performs better. The Sec trust system is dependable and secure, but it is inefficient in routing between the source and destination. The efficient routing technique decreases network overhead, which reduces packet flooding and, as a result, improves routing efficiency. The Hybrid trust method enhances routing reliability by consuming the energy consumption of mobile nodes in an MANET IoT network.
Key-Words / Index Term
IoT-MANET, Nodes, Hybrid Trust, Sec trust, Routing, Sybil Attacker
References
[1] I. Chlamtac, M. Conti, and J. J.-N. Liu, “Mobile Ad Hoc Networking: Imperatives and Challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 12-64, 2003.
[2] V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, and H. Weiss, “Delay-Tolerant Networking Architecture,” RFC 4838, IETF, 2007.
[3] J. N. Al-Karaki, and A. E. Kamal, “Routing Rechniques in Wireless Sensor Networks: A Survey,” IEEE Wireless Communications, vol. 11, no. 6, pp. 6-28, Dec. 2004.
[4] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A urvey,” Computer Networks, vol. 54, no. 15, pp. 2787-2805, Oct. 2010.
[5] P. Juang, H. Oki, and Y. Wang, “Energy Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet, ”International Conference on Architectural Support for Programming Languages and Operating Systems, San Jose, CA, Oct. 2002, pp. 96-107.
[6] B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, “A Survey of Routing Attacks in Mobile Ad Hoc Networks,” IEEE Wireless Communications, vol. 14, no. 5, pp. 85-91, Oct. 2007.
[7] K. Pelechrinis, C. Koufogiannakis, and S. V. Krishnamurthy, “On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks,” IEEE Transactions on Wireless Communications, vol. 9, no. 10, pp. 3258- 3271, October 2010.
[8] Aditya Tandon, Prakash Srivastava, “Trust-based Enhanced Secure Routing against Rank and Sybil Attacks in IoT” 2019 IEEE.
[9] Ismail Butun, Member, IEEE, et.al.“Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures” Manuscript received March 5, 2019.
[10] Wang, Yizhong, “Secure routing protocol over mobile Internet of Things wireless sensor networks” Monterey, California 2018.
[11] Ruchi Mehta, M.M.Parmar, “A Survey on Security Attacks and Countermeasures in RPL for Internet of Things”IJARSE April 2018.
[12] VISHAL SHARMA, (Member, IEEE), et. al “Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey” IEEE ACCESS Received July 28, 2020, accepted August 26, 2020.
[13] Hassan I. Ahmed, Abdurrahman A, et. al.“A survey of IoT security threats and defenses” International Journal of Advanced Computer Research, Vol. 9(45), 2019.
[14] Weidong Fang, Wuxiong Zhang,et.al.“Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey” Hindawi Wireless Communications and Mobile Computing Volume 2020,
[15] Anhtuan Le, Jonathan Loo, Aboubaker Lasebae et. al.“The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks” IEEE Sensors Journal, Vol. 13, No. 10, October 2013.
[16] Divya Sharma, Ishani Mishra, et. al. “A Detailed Classification of Routing Attacks against RPL in Internet of Things” 2017, IJARIIT.
[17] Nasr Abosata, Saba Al-Rubaye Et.Al. “Internet Of Things For System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications” Sensors 2021.
[18] Karen Avila, Daladier Jabba, et. al. “Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT”MDPI Published: 17 September 2020.
[19] D.Sterne, P.Balasubramanyam, D.Carman, B.Wilson, R. Talpade, C.Ko, R. Balupari, C.-Y. Tseng, T.Bowen, K.Levitt and J.Rowe, “A General Cooperative Intrusion Detection Architecture for MANETs”, Proc. IEEE International Workshop on Information Assurance (IWIA 05), 2005.
[20] Y. Huang and W. Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks”, Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks, New York, USA, 2003.
[21] B. Pahlevanzadeh and A. Samsudin, “Distributed Hierarchical IDS for MANET over AODV”, Proc. IEEE International Conference on Telecommunications, Malaysia, May 2007.
[22] Soni G., Chandravanshi K., Jhariya M.K., Rajput A. (2022) An IPS Approach to Secure V-RSU Communication from Blackhole and Wormhole Attacks in VANET. In: Sarma H.K.D., Balas V.E., Bhuyan B., Dutta N. (eds) Contemporary Issues in Communication, Cloud and Big Data Analytics. Lecture Notes in Networks and Systems, vol 281. Springer, Singapore. https://doi.org/10.1007/978-981-16-4244-9_5
[23] P. Yi, Y. Jiang, Y. Zhong and S. Zhang, “Distributed Intrusion Detection for Mobile Ad Hoc Networks”, Proc. IEEE Application and Internet Workshop, 2005.
[24] G. Soni, M. K. Jhariya, K. Chandravanshi and D. Tomar, "A Multipath Location based Hybrid DMR Protocol in MANET," 2020 3rd International Conference on Emerging Technologies in Computer Engineering: Machine Learning and Internet of Things (ICETCE), pp. 191-196, 2020. doi: 10.1109/ICETCE48199.2020.9091778.
[25] J.C. Kao and R. Marculescu, “Eavesdropping Minimization via Transmission Power Control in Ad Hoc Wireless Networks”, Proc. IEEE Sensors and Ad hoc Communication and Networks SECON, 2006.
[26] T. He, H. Wang and K.W. Lee, “Traffic analysis in anonyms MANETs”, Proc. IEEE Military Communication Conference MILCOM, November 2008.
[27] J. Kong, X. Hong and M. Gerla, “A new set of passive routing attacks in Mobile ad hoc networks”, Proc. IEEE Military Communication Conference MILCOM, October 2003.
[28] E. Perkins and M. Royer, “Ad Hoc On Demand Distance Vector Routing”, Sun MicroSystem Laboratories Advance Development Group, Proceeding of the IEEE MOBICOM, pp 90-100, 1999.
[29] B. Johnson and A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks”, Proc. Mobile Computing Journal, Vol.353, pp 153-181, 1996.
[30] Kamlesh Chandravanshi, Akrosh Tiwari And Mukesh Bathre, “Intrusion Detection system in Wireless Ad-Hoc Network”, Computer and Network Technology, pp. 267-271, 2009. https://doi.org/10.1142/9789814289771_0052
[31] M. Pirrete and R. Brooks, “The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defence”, International Journal of Distributed Sensor Networks, Vol.2, No.3, pp 267-287, 2006.