SYBIL ATTACK SIMULATION AND MITIGATION IN UNETSTACK

dc.contributor.authorChandavarkar, B.R.
dc.contributor.authorShantanu, T.K.
dc.date.accessioned2026-02-06T06:36:05Z
dc.date.issued2021
dc.description.abstractUnderwater networks have the potential to enable unexplored applications and to enhance our ability to observe and predict the ocean. Underwater acoustic sensor networks (UASNs) are often deployed in unprecedented and hostile waters and face many security threats. Applications based on UASNs such as coastal defense, pollution monitoring, assisted navigation to name a few, require secure communication. A new set of communication protocols and cooperative coordination algorithms have been proposed to enable collaborative monitoring tasks. However, such protocols overlook security as a key performance indicator. Spoofing, altering, or replaying routing information can affect the entire network, making UASN vulnerable to routing attacks such as selective forwarding, sinkhole attack, Sybil attack, acknowledgement spoofing and HELLO flood attack. The lack of security against such threats is startling if maintained that security is indeed an important requirement in many emerging civilian and military applications. In this work, we look at one of the most prevalent attacks among UASNs which is Sybill attack and discuss mitigation approaches for it. Then, feasibly implemented the attack in UnetStack3 to simulate real-life scenario. © 2021 IEEE.
dc.identifier.citation2021 12th International Conference on Computing Communication and Networking Technologies, ICCCNT 2021, 2021, Vol., , p. -
dc.identifier.urihttps://doi.org/10.1109/ICCCNT51525.2021.9579859
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/30235
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.subjectmitigation strategy
dc.subjectsecurity
dc.subjectSybil attack
dc.subjectUnderwater acoustic sensor network(UASN)
dc.subjectUnetStack
dc.titleSYBIL ATTACK SIMULATION AND MITIGATION IN UNETSTACK

Files