Peer-to-Peer Systems

  • Douceur J
  • 2


    Mendeley users who have this article in their library.
  • N/A


    Citations of this article.


Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats,
many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a
substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these “Sybil attacks”
is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks
are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in


  • John Douceur

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free