Defending the Sybil attack in P2P networks: Taxonomy, challenges, and a proposal for self-registration
Authors/Editors
Research Areas
- Health sciences (Areas of application)
- Health sciences (Disciplinary fields)
- Health sciences (Research subjects)
- Human and social sciences (Areas of application)
- Human and social sciences (Disciplinary fields)
- Human and social sciences (Research subjects)
- Natural science and engineering (Disciplinary fields)
- Natural science and engineering (Research subjects)
Publication Details
Output type: Other
Author list: Dinger J, Hartenstein H
Publication year: 2006
Start page: 756
End page: 763
Number of pages: 8
ISBN: 0-7695-2567-9
Languages: English-Great Britain (EN-GB)
Unpaywall Data
Open access status: closed
Abstract
The robustness of Peer-to-Peer (P2P) networks, in particular of DHT-based overlay networks, suffers significantly when a Sybil attack is performed. We tackle the issue of Sybil attacks from two sides. First, we clarify, analyze, and classify the P2P identifier assignment process. By clearly separating network participants from network nodes, two challenges of P2P networks under a Sybil attack become obvious: i) stability over time, and ii) identity differentiation. Second, as a starting point for a quantitative analysis of time-stability of P2P networks under Sybil attacks and under some assumptions with respect to identity differentiation, we propose an identity registration procedure called self-registration that makes use of the inherent distribution mechanisms of a P2P network.
Keywords
No matching items found.
Documents
No matching items found.