Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration

Author(s):  
J. Dinger ◽  
H. Hartenstein
Keyword(s):  
2013 ◽  
Vol 446-447 ◽  
pp. 1596-1600
Author(s):  
Zong Yuan Guo ◽  
Carlos Madrazo ◽  
Keiichi Koyanag

In P2P networks, malice peers forge identity to interrupt routing, called Sybil attack. To avoid it, methods in related works consider routing as random walk. Since the destination of random walk is hard to predict, Sybil-proof P2P networks need large routing information to support routing. However, a large size routing table constrains the scalability of the system. Therefore, we aim to develop a routing algorithm to satisfy the requirement of P2P networks which has a good performance at Sybil-Proof by using a reasonable size of routing table. Social links are useful to prevent a Sybil attack because friend peers have little chance to be a Sybil peer. In this proposed method, reputation of social link is useful for achieving this objective. Considering the distance to destination peers can help for routing efficiency and considering the reputation can make routing to have better performance resisting Sybil-attacks.


2010 ◽  
Vol 20 (7) ◽  
pp. 1800-1811
Author(s):  
Si-Yao CHENG ◽  
Shou-Xu JIANG ◽  
Jian-Zhong LI

2014 ◽  
Vol 24 (1) ◽  
pp. 139-152
Author(s):  
Guo-Yin ZHANG ◽  
Jun LI

2011 ◽  
Vol 34 (9) ◽  
pp. 1563-1577
Author(s):  
Zhi-Peng FU ◽  
Huai-Min WANG ◽  
Dian-Xi SHI ◽  
Peng ZOU
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document