Topic > Sybil Attack Essay - 631

In Sybil Attack, an attacker presents multiple addresses and behaves as if it were a group of nodes. There are mainly two different ways through which a Sibilla node can acquire an identity; steal the identity of other nodes or fabricate false identities. By impersonating a large number of nodes in the network, the attacker prevents other nodes from using those addresses, so they can evade detection systems. This attack can severely damage geographic routing protocols and can even threaten multi-path routing schemes and node localization [18].B. Sinkhole Attack A sinkhole attacker places himself in a very strong state in the network and informs a high-quality route to the destination or spoofs neighbor nodes that are close to the destination. The compromised node at the heart of the sinkhole could then perform selective forwarding, packet dropping, or data manipulation [19].C. Blackhole AttackBlackhole attack is another type of DoS attack that generates and disseminates build routing information. As mentioned in [20], an attacker, exploiting the Flooding-based routing protocol, advertises himself as having a valid shortest path to the recipient node. If the attacker responds to the requesting node before the actual node responds, a fake route will be created. So packets are not forwarded to a specific destination node; instead, the attacker intercepts the packets, drops them, and then attracts network traffic [21].D. Gray Hole AttackLet us now explain the gray hole attack on MANETs. The gray hole attack has two phases. In the first phase, an attacker exploits the AODV protocol to advertise himself as having a valid route to a destination node, with the intention of intercepting packets, even if the route is spurious. In the second... half of the card... a lot of packages. Therefore, the victim node or sometimes the entire network can be easily paralyzed [24].G. Wormhole attack Also called tunneling attack, it is one of the most sophisticated MANET attacks. In this attack, an attacker captures data packets from one point on a network and funnels them through an out-of-band channel to another attacker located several hops away, who forwards them to nearby nodes. The tunnel between attackers is actually faster than links between legitimate nodes, so tunneled packets arrive before packets via other paths. Therefore, attackers are more likely to be included in the path and take advantage for future attacks. Wormhole attack detection is generally difficult and requires the use of an unalterable and independent physical metric, such as time delay or geographic location [25].