{"title":"Defeating against Sybil-attacks in Peer-to-peer Networks","authors":"X. Xiang","doi":"10.1109/IPDPSW.2012.149","DOIUrl":null,"url":null,"abstract":"There has been a spurt of works showing that the existence of sybil attacks is a serious threat to Peer-to-Peer networks, where one or more attackers can forge a large number of fictitious identities. In this paper, we present a distributed protocol to reduce the adverse effects of sybil attacks in free riding problem. Our approach focuses on restricting nodes to obtain the number of service units in a reasonable level. Unlike other protocols, our protocol works well even if there are a large number of sybil nodes in the network. Our results show the promise of the protocol in limiting sybil attacks while not sacrificing application performance.","PeriodicalId":378335,"journal":{"name":"2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IPDPSW.2012.149","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
There has been a spurt of works showing that the existence of sybil attacks is a serious threat to Peer-to-Peer networks, where one or more attackers can forge a large number of fictitious identities. In this paper, we present a distributed protocol to reduce the adverse effects of sybil attacks in free riding problem. Our approach focuses on restricting nodes to obtain the number of service units in a reasonable level. Unlike other protocols, our protocol works well even if there are a large number of sybil nodes in the network. Our results show the promise of the protocol in limiting sybil attacks while not sacrificing application performance.