A Survey: Detection and Mitigation Techniques of Sybil in the Networks


  • Meena Bharti, Dr Shaveta Rani, Dr Paramjeet Singh




Wireless networks are complicated to put together, and the more people use them over time, the more complicated they become. Wireless networks are made up of many different types of technology, which means they have vulnerabilities. One vulnerability is that they are easily spoofed or impersonated by Sybil attacks. In a Sybil attack, the attacker disguises themselves as someone else and generates various identities to have access to the system. This type of attack is typically accomplished by creating multiple fake user accounts. The attacker then uses these fake accounts to promote their content or ideas, vote for their own content or ideas, and/or harass other users. Since wireless networks are very resource-constrained, it is vital to develop more efficient and lightweight trustworthy security mechanisms to identify & track Sybil attacks as these are a major concern for the stability or security of the network. There are some security schemes for prevention against Sybil attacks, like cryptography, privacy-preserving solutions and lightweight authentication. Cryptography and privacy-preserving techniques require key management and additional infrastructure overhead, which makes them difficult to establish and maintain in a limited resource environment. The lightweight trusted system detects & avoids single node and multi-node attacks under different conditions. In this paper, a survey is conducted on various techniques for the detection of Sybil attacks.




How to Cite

Dr Shaveta Rani, Dr Paramjeet Singh, M. B. . (2022). A Survey: Detection and Mitigation Techniques of Sybil in the Networks. Mathematical Statistician and Engineering Applications, 71(2), 51 –. https://doi.org/10.17762/msea.v71i2.66