1. On the vulnerability of the mobile ad hoc network to transmission power controlled Sybil attack: Adopting the mobility-based clustering.
- Author
-
Vasudeva, Amol and Sood, Manu
- Subjects
AD hoc computer networks ,POWER transmission ,END-to-end delay ,MOBILE robots - Abstract
The large-scale deployment of Mobile Ad hoc Networks (MANETs) requires dealing with the issues like low throughput, end-to-end delay, and energy exhaustion. In order to resolve these issues, a MANET is organized into a hierarchical structure using a suitable clustering scheme. The nodes belonging to a cluster are referred to as the member nodes. One of the member nodes in each cluster is elected as the cluster head based on its characteristics like identity, residual energy, node degree, and mobility. The representative node is assigned all the cluster management responsibilities making it liable to be the main target for the attackers. After having control of a cluster, the Sybil attacker may disrupt various functions of the MANET. This paper proposes a transmission power-controlled approach by which a Sybil attack is capable of violating the functioning of the mobility-based clustering algorithm in MANETs. We have shown that the transmission power-controlled approach can be used to bias the cluster head election process by repeatedly tilting the results in favor of the Sybil attacker node. The supporting simulation results clearly indicate that the proposed Sybil attack considerably increases the probability of the Sybil attacker node becoming the cluster head. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF