Open Access Open Access  Restricted Access Subscription or Fee Access

AERC-Hybrid Technique to Prevent Sybil Attack in MANET

Simranjeet Kaur, Gagangeet Singh Aujla


Completely self-organized mobile ad hoc networks (MANETs) signifies multifaceted distributed systems which can be part of infinite multifaceted system, such as a difficult system-of-systems used for crisis organization operations. Due to the complex environment of MANETs and its resource constraint nodes, security solutions are required to protect the network. Since MANETs require a single, divergent, and constant identity per node in order for their safety protocols to be feasible, Sybil attacks create a grave threat to such networks. A Sybil attack is an attack in which intruder can create multiple identities at a time to increases the misjudgment in the network or can exchange identities in order to weaken the recognition process, thereby supporting short of  liability in the mobile ad hoc network. We introduce a HYBRID Algorithm that is Advanced Encryption Rivest Cipher (AERC) by integrating Advanced Encryption Standard (AES), RC5 and Genetic Algorithm (GA). We propose this Hybrid method for the improved security purpose. Performance simulation is taken place in the MATLAB environment.


MANET, Sybil Attack, AERC, AES, RC5, GA.

Full Text:



Kumar, M. and Mishra, R., “An Overview of MANET” In IJCSE Vol. 3 No. 1 Feb-March 2012.

Goyal, P. “MANET: Vulnerabilities, Challenges, Attacks, Applications” In IJCEM Vol. 11, January 2011.

Stepashkin, M.” Various Attacks on Mobile Ad-Hoc Networks: an Overview”, ieee(2010).

Piro, C. and Levine, B.N., “Detecting the Sybil attack in mobile ad hoc networks,” in Proc. Securecomm Workshops, 2006, pp 1–11.

Newsome, J. and Perrig, A. “The Sybil Attack in Sensor Networks: Analysis and Defenses” IPSN’04, April 26-27,2004, Berkeley, California, USA.

Yu, H. and Kaminsky, M. “Sybil Guard: Defending Against Sybil Attacks via Social Networks” IEEE, Vol. 16, No. 3, June 2008.

William, S., Cryptography and Network Security: Principles and Practice, 2nd edition, Prentice-Hall, Inc., 1999 pp 23-50.

Abdel-Karim Al Tamimi, “Performance Analysis of Data Encryption Algorithms” IJCAT, Vol. 4, No.3, January 2010.

Selent, D. “Advanced Encryption Standard“ InSight: Rivier Academic Journal, Volume 6, Number 2, Fall 2010.

Ronald L. Rivest, “The RC5 Encryption Algorithm”

Scott, M. ”An Introduction to Genetic Algorithm” IN 46315 , JCSC 20, 1 (October 2004).

Suen.T and Yasinsac.A, “Ad hoc network security: Peer identification and authentication using signal properties,” presented at the Proc. 6th Annual IEEE SMC Information Assurance Workshop (IAW), New York, Jun. 2005, pp. 432–433.

Levine B. N, Shields.C, and Margolin N. B, “A survey of solutions to the Sybil attack,” Univ. Mass. Amherst, Amherst, Tech. Rep. 2006-052, Oct. 2006.

Hoang Lan Nguyen, Uyen Trang Nguyen. “A study of different types of attacks on multicast in mobile ad hoc networks”. Ad Hoc Networks, Volume 6, Issue 1, Pages 32-46, January 2008.

Margolin N. B. and Levine B. N., “Quantifying resistance to the Sybil attack,” in Financial Cryptography and Data Security. Berlin, Germany: Springer, 2008.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.