Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Malicious User Limit:A Decentralized Approach against Sybil Attacks


Affiliations
1 Department of Information Technology, SNS College of Technology, Coimbatore 641035, Tamilnadu, India
2 Department of Information Technology, SNS College of Technology, Coimbatore-641035, Tamilnadu, India
     

   Subscribe/Renew Journal


Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to Sybil attacks. In a Sybil attack, a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. By controlling a large fraction of the nodes in the network, this paper presents Sybil Limit, a novel protocol for limiting the corruptive influences of Sybil attacks. Sybil limit a new protocol for defending against Sybil attacks without relying on a trusted central authority. Sybil limit leverages a key insight regarding social networks. The edges connecting the honest region and the Sybil region are called attack edges. Sybil limit, a novel protocol for limiting the corruptive influences of Sybil attacks. This protocol is based on the social network among user identities, where an edge between two identities indicates a human-established trust relationship. It ensures that the number of attack edges is independent of the number of Sybil identities, and is limited by the number of trust relation pairs between malicious users and honest users. Sybil limit leverages the existing human-established trust relationships among users to bind both the number and size of Sybil groups.

Keywords

Peer-to-Peer, Social Networks, Sybilattack, Sybil Identities, SybilGuard, SybilLimit.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 217

PDF Views: 3




  • Malicious User Limit:A Decentralized Approach against Sybil Attacks

Abstract Views: 217  |  PDF Views: 3

Authors

M. Kowsigan
Department of Information Technology, SNS College of Technology, Coimbatore 641035, Tamilnadu, India
K. Rajakumari
Department of Information Technology, SNS College of Technology, Coimbatore-641035, Tamilnadu, India

Abstract


Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to Sybil attacks. In a Sybil attack, a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. By controlling a large fraction of the nodes in the network, this paper presents Sybil Limit, a novel protocol for limiting the corruptive influences of Sybil attacks. Sybil limit a new protocol for defending against Sybil attacks without relying on a trusted central authority. Sybil limit leverages a key insight regarding social networks. The edges connecting the honest region and the Sybil region are called attack edges. Sybil limit, a novel protocol for limiting the corruptive influences of Sybil attacks. This protocol is based on the social network among user identities, where an edge between two identities indicates a human-established trust relationship. It ensures that the number of attack edges is independent of the number of Sybil identities, and is limited by the number of trust relation pairs between malicious users and honest users. Sybil limit leverages the existing human-established trust relationships among users to bind both the number and size of Sybil groups.

Keywords


Peer-to-Peer, Social Networks, Sybilattack, Sybil Identities, SybilGuard, SybilLimit.