Detecting Sybil nodes in static and dynamic networks

2Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Peer-to-peer systems are known to be vulnerable to the Sybil attack. The lack of a central authority allows a malicious user to create many fake identities (called Sybil nodes) pretending to be independent honest nodes. The goal of the malicious user is to influence the system on his/her behalf. In order to detect the Sybil nodes and prevent the attack, we use here a reputation system for every node, built through observing its interactions with its peers. The construction makes every node a part of a distributed authority that keeps records on the reputation and behavior of the nodes. Records of interactions between nodes are broadcast by the interacting nodes and honest reporting proves to be a Nash Equilibrium for correct (non-Sybil) nodes. We argue that in realistic communication schedule scenarios, simple graph-theoretic queries help in exposing those nodes most likely to be Sybil. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Cárdenas-Haro, J. A., & Konjevod, G. (2010). Detecting Sybil nodes in static and dynamic networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6427 LNCS, pp. 894–917). https://doi.org/10.1007/978-3-642-16949-6_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free