NUST Institutional Repository

Sybil attack detection using received signal strength in MIMO systems

Show simple item record

dc.contributor.author Jabeen, Mashal
dc.date.accessioned 2024-11-12T07:57:19Z
dc.date.available 2024-11-12T07:57:19Z
dc.date.issued 2024-11-12
dc.identifier.other 00000328778
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/47895
dc.description Supervised by Asst Prof Dr. Dr. Abdul Wakeel en_US
dc.description.abstract Identity theft in distributed networks, such as the internet, is becoming a significant problem due to Sybil attacks. In these attacks, perpetrators create multiple fake identities to manipulate network decisions. Traditional cryptographic methods for detecting these attacks can be resource-intensive and sometimes ineffective. This study suggests using Received Signal Strength R_S_S based techniques in massive MIMO systems, along with diversity combining methods like Selection Combining (SLC), Equal Gain Combining (EGC), and Maximal Ratio Combining (MRC). The research also involves using machine learning algorithms such as K-means and K-medoids for clustering to distinguish between legitimate nodes and attackers. Machine learning techniques like KNN and Naive Bayes are used to conclude results. The results indicate that configurations with 30-40 antennas and low noise levels can achieve high detection accuracy. This method combines physical-layer security with machine learning, making future wireless networks more resilient against Sybil attacks. en_US
dc.language.iso en en_US
dc.publisher MCS en_US
dc.title Sybil attack detection using received signal strength in MIMO systems en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account