• May 27, 2016 News!The submission for Special Issue is officially open now!   [Click]
  • May 03, 2016 News!Vol.6, No.6 has been indexed by EI (Inspec).   [Click]
  • Mar 17, 2017 News!Vol.9, No.2 has been published with online version. 13 peer reviewed articles from 4 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2010 Vol.2(5): 760-767 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2010.V2.238

Incrimination Immune Method (I2M) – A Novel Messaging Technique To Combat Sybil Attack In Ad Hoc Network

N. Sreenath, S. Vijayalakshmi, P. Annadurai

Abstract—Ad hoc networks are an emerging area of mobile computing and efficient paradigm for infrastructure less communication. This paper analyzes the impact of Sybil attack with Incrimination Immune Method (I2M). Sybil attack illegally claims/forges the identities of other genuine nodes in ad hoc network. The Master Sybil node maintains pool of subverted shadow identities which misuses them to disrupt the routing process. A malicious node incriminating or impersonating the other innocent nodes is defined as an entrap attack which forms a part of Sybil attack. The concept of Neighbor Aware Multicast Routing Protocol (NAMP) is deployed which warrants the creation of primary and secondary forwarding list. This idea has substantially helped the ad hoc network to be resilient to Sybil attack where a subverted node in the primary list disrupting the communication is blacklisted by the sender after receiving a threshold number of Node Accusation Report (NAR) from the genuine receivers which has bore the brunt of non receipt of packets. Consequently the Master Sybil node realizing the triviality of the shadow identities release them. These freed Sybil nodes jointly sends a unique novel message called Unleashed Sybil Incriminated Node Consensus Penalization (USINCP) to the sender in spotting the master Sybil adversary. This messaging technique is initiated only on demand (ie. When there is a Sybil attack) so it incurs less overhead and minimal memory requirements besides boosting the network performance. Two graphs have been theoretically conceived to study the effect of this messaging technique by plotting the number of groups with multicast members in x axis and end-to-end delay in y axis.

Index Terms—Ad hoc Network, NAMP, Node Accusation Report, Sybil Attack.

F. N. Sreenath is with Pondicherry Engineering College, Pondicherry (e-mail: nsreenath@pec.edu).
S. S. Vijayalakshmi is with Pondicherry University, Pondicherry. She is now with the Department of Banking Technology. (Corresponding author Phone no: 9894597730; e-mail: anviji_lakshmi@yahoo.co.in).
T. P. Annadurai is with Kanchi Mamunivar College of Post Graduate Studies, Pondicherry (e-mail: annadurai_aps70@yahoo.com).

[PDF]

Cite: N. Sreenath, S. Vijayalakshmi and P. Annadurai, "Incrimination Immune Method (I2M) – A Novel Messaging Technique To Combat Sybil Attack In Ad Hoc Network," International Journal of Computer Theory and Engineering vol. 2, no. 5, pp. 760-767, 2010.  

Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com