Combating Sybil Attacks using SybilGuard
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 2
Abstract
This paper presents a Sybil Guard, for combating against Sybil attacks without relying on a trusted central authority. Peer-to-peer and other decentralized, distributed systems are known to be particularly open to Sybil attacks. In aSybil attack, a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. Among the small number of decentralized approaches, our recent SybilGuard leverages a key insight on social networks to bind the number of Sybil nodes accepted. Despite its promising direction, SybilGuard can allow a large number of Sybil nodes to be accepted. Furthermore, Sybil Guard assumes that socialnetworks are fast-mixing, which has never been confirmed in the real world. SybilGuard exploits this property to bind the number of identities a malicious user can create. Sybil Guard offers dramatically improved and near optimal guarantees.
Authors and Affiliations
Abhijeet B. Potey , Prof. Anjali B. Raut
Link Stability and Energy Optimization by Excluding Self node for Mobile and Wireless Networks
MOBILE ad hoc networks (MANETs) have more popularity among mobile network devices and wireless communication technologies. A MANET is multihop mobile wireless network that have neither a fixed infrastructure nor a...
Reliability Analysis of Nanoscale CMOS Device with HCI Effect
The paper focuses on the reliability due to hot carrier effects of CMOS and the HC effect under high gate voltage stress. How these stress factors vary with operating conditions, the required foundry qualification test d...
Compression Record Based Efficient k - Medoid Algorithm to Increase Scalability and Efficiency
Clustering analysis is a descriptive task that seeks to identify homogeneous groups of objects based on the values of their attri butes. K - medoid clustering algorithms are widely used for many practical applica...
Approved Protocol For Reliability In Peer to Peer Networks
An important issue in peer-to-peer networks is discussed in this paper. peer-to-peer networks appeared as common method of sharing huge volume of data. These networks allow users to share their resources as completely di...
Extracting and Aligning the Data Using Tag Path Clustering and CTVS Method
– Web database generate query result page based on user’s query. The information extracted automatically from query result page is used in many web applications. We present a novel method called Tag path clustering fo...