DocumentCode
2986182
Title
Modeling and Analyzing the Sybil Attack to Ad-Hoc Routing Protocols
Author
Gui, Jing-Jing ; Zhang, Tao ; Zhang, Yu-Sen
Author_Institution
Inf. Technol. Dept., PLA Univ. of Sci. & Technol., Nanjing, China
fYear
2010
fDate
29-31 Oct. 2010
Firstpage
1
Lastpage
5
Abstract
The Sybil attack is exceedingly detrimental and subtle to routing mechanism in ad-hoc network. In this paper we propose a framework in which the vulnerability to the Sybil attack for ad-hoc routing protocol can be modeled in a mathematic approach, and the formal analysis is carried out under our extended strand space mode in order to further analyze the validity of the threats from the Sybil attackers. As an example, our framework is used to analyze a security route protocol, called endairA, the result shows that endairA has a flaw of creating false routes in present of the Sybil attack by utilizing some specific network topology leak.
Keywords
ad hoc networks; mobile radio; routing protocols; telecommunication network topology; telecommunication security; ad-hoc network; ad-hoc routing protocols; endairA; formal analysis; mathematic approach; mobile ad-hoc networks; network topology; security route protocol analysis; strand space mode; sybil attack modelling; Analytical models; Mobile ad hoc networks; Routing; Routing protocols; Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Multimedia Technology (ICMT), 2010 International Conference on
Conference_Location
Ningbo
Print_ISBN
978-1-4244-7871-2
Type
conf
DOI
10.1109/ICMULT.2010.5630187
Filename
5630187
Link To Document