TY - JOUR TI - Establishing the Anonymity to Mitigate Identity Based Attacks AU - Revathi V AU - Guganesan E AU - Surya Prasanth M AU - Tharani M AU - Uthra P JO - International Journal of Scientific Research in Computer Science, Engineering and Information Technology PB - Technoscience Academy DA - 2017/04/30 PY - 2017 DO - https://doi.org/10.32628/IJSRCSEIT UR - https://ijsrcseit.com/CSEIT1722224 VL - 2 IS - 2 SP - 621 EP - 633 AB - Identity information of the devices are the significant factor to establish the adversaries in the network. Sybil attacks are executed by capturing the IP address and Mac address of the victim devices. Location and channel based information are extracted to eliminate these attacks from the network. But the cooperative attacks can able to capture the data information by providing the fake channel and location information. The Location Distinction model is fails to identify the Identity based attacks when the victim and malicious devices are present in same location. The proposed hashing based anonymity approach can able to prevent the identity based attacks.