Journal of Cognitive Human-Computer Interaction

Journal DOI

https://doi.org/10.54216/JCHCI

Submit Your Paper

2771-1463ISSN (Online) 2771-1471ISSN (Print)
Full Length Article

Journal of Cognitive Human-Computer Interaction

Volume 8, Issue 1, PP: 22-34, 2024 | Cite this article as | XML | | Html PDF

Sybil Attack Detection Techniques in Wireless Network: A Comprehensive Review

Lalzuitluanga   1 * , Lalremruata   2 , Vanlalhruaia   3

  • 1 Department of Computer Engineering, Mizoram University, Aizawl-796004, India - (lalzuitluanga19@gmail.com)
  • 2 Department of Computer Engineering, Mizoram University, Aizawl-796004, India - (remruata1712@gmail.com)
  • 3 Assistant Professor, Department of Computer Engineering, Mizoram University, Aizawl-796004, India - (mzut160@mzu.edu.in)
  • Doi: https://doi.org/10.54216/JCHCI.080103

    Received: October 05, 2023 Revised: January 12, 2024 Accepted: April 15, 2024
    Abstract

    In today's rapidly evolving world, wireless technology has emerged as an essential solution for establishing connectivity in diverse environments. They offer cost-effective deployment options and scalability, accommodating organizational growth without the need for extensive infrastructure changes. However, wireless networks are susceptible to various security attacks, including Sybil attacks. In this paper, we provide a comprehensive review of Sybil attack detection techniques in wireless networks i.e. Mobile Ad hoc Network (MANET) and Wireless Mesh Networks (WMNs). In this paper, we analyze a range of methods proposed to detect and mitigate Sybil attacks, including approaches based on genetic algorithms, fuzzy logic, secure routing protocols, and hybrid techniques combining different detection mechanisms. Additionally, we explore the use of bio-inspired algorithms, such as the Bacteria Foraging Optimization Algorithm (BFOA), and discuss novel strategies integrating node authentication and threshold-based mechanisms. By examining the strengths and limitations of each approach, this review offers valuable insights into the state-of-the-art in Sybil attack detection in wireless networks, aiding researchers and practitioners in developing robust security solutions.

    Keywords :

    Fake node , Sybil Attack , Wireless Mesh Networks (WMNs) , MANET  ,

    References

    [1]     Khan, Burhan Ul Islam, et al. "A survey on MANETs: architecture, evolution, applications, security issues and solutions." Indonesian Journal of Electrical Engineering and Computer Science 12.2 (2018): 832-842.

    [2]     Kumar, Sandeep, et al. "Routing protocols and security issues in MANET." 2017 international conference on infocom technologies and unmanned systems (trends and future directions)(ICTUS). IEEE, 2017.

    [3]     Karthika, K. C. "Wireless mesh network: A survey." 2016 international conference on wireless communications, signal processing and networking (WiSPNET). IEEE, 2016.

    [4]     Shahdad, Syed Yasmeen, Asfia Sabahath, and Reshma Parveez. "Architecture, issues and challenges of wireless mesh network." 2016 International Conference on Communication and Signal Processing (ICCSP). IEEE, 2016.

    [5]     Vijay K. "Collaborating The Textual Reviews Of The Merchandise and Foretelling The Rating Supported Social Sentiment." Journal of Cognitive Human-Computer Interaction, Vol. 1, No. 2, 2021 ,PP. 63 - 72.

    [6]     Sachdeva, Ratika, and Aashima Singla. "Survey on Privacy Issues and Security Attacks in Wireless Mesh Networks." International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSE) 3 (2013).

    [7]     Atwal, Harsatnam Singh, and Narinder Kumar Rana. "A REVIEW OF SYBIL ATTACK IN MANET."

    [8]     Deswal, Paramveer Singh, Bindu Rani, and M. A. Rai. "Review on the Detection and Prevention Technique of Sybil Attack." Mukt Shabd J 9 (2020): 1-6.

    [9]     Vasudeva, A., Sood, M., Survey on sybil attack defense mechanisms in wireless ad hoc networks, Journal of Network and Computer Applications (2018), doi: 10.1016/ j.jnca.2018.07.006.

    [10]   Lakhanpal, Rohit, and Sangeeta Sharma. "Detection & Prevention of Sybil attack in Ad hoc network using hybrid MAP & MAC technique." 2016 International Conference on Computation of Power, Energy Information and Commuincation (ICCPEIC). IEEE, 2016.

    [11]   Yadav, Priyanka, and Muzzammil Hussain. "A secure AODV routing protocol with node authentication." 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA). Vol. 1. IEEE, 2017.

    [12]   R. Venkatesan ,Althaaf Shaik ,Suraj Kumar,Vipul Guria ,Abhishek Raj. "Intelligent Smart Dustbin System using Internet of Things (IoT) for Health Care." Journal of Cognitive Human-Computer Interaction, Vol. 1, No. 2, 2021 ,PP. 73 - 80.

    [13]   Chauhan, Deeksha Singh, and Shalley Bakshi. "Mitigation of Sybil attack in MANET using GA with Fuzzy Logic." Management 3.4 (2018): 12-19.

    [14]   S. Swathi , Dr. R. Vadivel, 2020, Bio-Inspired Approach Sybil Attack in AODV based MANET using BFOS Algorithm, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT) Volume 09, Issue 07 (July 2020),

    [15]   Rethinavalli, S., and R. Gopinath. "Classification Approach based Sybil Node Detection in Mobile Ad Hoc Networks." International Journal of Advanced Research in Engineering and Technology 11.12 (2020): 3348-3356.

    [16]   Saindane, Dhanashri. "Sybil Attack Detection in Mobile Ad-hoc Networks using AODV protocol." Sybil 8.07 (2021). Bharti, Meena, Shaveta Rani, and Paramjeet Singh. "RTBSAD: RSSI AND TRUST-BASED SYBIL ATTACK DETECTION IN MANET." Indian Journal of Computer 

    Cite This Article As :
    Lalzuitluanga, Lalremruata , Vanlalhruaia. "Sybil Attack Detection Techniques in Wireless Network: A Comprehensive Review." Full Length Article, Vol. 8, No. 1, 2024 ,PP. 22-34 (Doi   :  https://doi.org/10.54216/JCHCI.080103)
    Lalzuitluanga, Lalremruata , Vanlalhruaia. (2024). Sybil Attack Detection Techniques in Wireless Network: A Comprehensive Review. Journal of , 8 ( 1 ), 22-34 (Doi   :  https://doi.org/10.54216/JCHCI.080103)
    Lalzuitluanga, Lalremruata , Vanlalhruaia. "Sybil Attack Detection Techniques in Wireless Network: A Comprehensive Review." Journal of , 8 no. 1 (2024): 22-34 (Doi   :  https://doi.org/10.54216/JCHCI.080103)
    Lalzuitluanga, Lalremruata , Vanlalhruaia. (2024). Sybil Attack Detection Techniques in Wireless Network: A Comprehensive Review. Journal of , 8 ( 1 ), 22-34 (Doi   :  https://doi.org/10.54216/JCHCI.080103)
    Lalzuitluanga, Lalremruata , Vanlalhruaia. Sybil Attack Detection Techniques in Wireless Network: A Comprehensive Review. Journal of , (2024); 8 ( 1 ): 22-34 (Doi   :  https://doi.org/10.54216/JCHCI.080103)
    Lalzuitluanga, Lalremruata, Vanlalhruaia, Sybil Attack Detection Techniques in Wireless Network: A Comprehensive Review, Journal of , Vol. 8 , No. 1 , (2024) : 22-34 (Doi   :  https://doi.org/10.54216/JCHCI.080103)