Sybil Attack Essay

631 Words2 Pages

In sybil attack, a attacker presents multiple addresses and behaves as if it were a group of nodes. There are, mainly, two different ways through which a sybil node can get an identity; stealing other node’s identity or fabricating fake identities. By impersonating a large number of nodes in the network, the attacker forbids other nodes from using those addresses, it can escape from detection systems. This attack can strongly harm geographic routing protocols, and can even threat multiple path routing schemes and node localization [18].
B. Sinkhole attack
A sinkhole attacker places itself at very strong status in the network and informs a high quality route to destination or spoofs neighboring nodes that are neighboring the destination. The compromised node at the sinkhole’s heart could then perform selective forwarding, packet dropping or data manipulation [19].
C. Blackhole attack
Blackhole attack is another type of DoS attack that generates and disseminates build routing information. As mentioned in [20], a attacker, exploiting the flooding based routing protocol, advertises itself as having a valid shortest route to the destined node. If the atacker replies to the requesting node before the actual node replies, a bogus route will be created. Hence packets are not forwarded to the certain destination node; instead, the attacker intercepts the packets, drops them and thus, attracts network traffic [21].
D. Grayhole attack
We now explain the gray hole attack on MANETs. The gray hole attack has two stages. In the first stage, a attacker exploits the AODV protocol to advertise itself as having a valid route to a destination node, with the intention of intercepting packets, even though the route is spurious. In the secon...

... middle of paper ...

...a flood of packets. Therefore, the victim node or sometimes the whole network can get easily paralyzed [24].
G. Wormhole attack
Also called tunneling attack, it is one of the most sophisticated attacks in MANETs. In this attack, a attacker captures data packets from one point in a network and tunnels them through an out of band channel to another attacker located several hops away, which relays them to its neighboring nodes. The tunnel between the attackers is actually faster than links between legitimate nodes, so the tunneled packets arrive sooner than packets through other routes. Therefore, the attackers are more likely to be included in the route and take an advantage for future attack. Detection of wormhole attack is generally difficult, and requires the use of an unalterable and independent physical metric, such as time delay or geographical location [25].

More about Sybil Attack Essay

Open Document