Combating Sybil Attacks using SybilGuard 

Abstract

This paper presents a Sybil Guard, for combating against Sybil attacks without relying on a trusted central authority. Peer-to-peer and other decentralized, distributed systems are known to be particularly open to Sybil attacks. In aSybil attack, a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. Among the small number of decentralized approaches, our recent SybilGuard leverages a key insight on social networks to bind the number of Sybil nodes accepted. Despite its promising direction, SybilGuard can allow a large number of Sybil nodes to be accepted. Furthermore, Sybil Guard assumes that socialnetworks are fast-mixing, which has never been confirmed in the real world. SybilGuard exploits this property to bind the number of identities a malicious user can create. Sybil Guard offers dramatically improved and near optimal guarantees. 

Authors and Affiliations

Abhijeet B. Potey , Prof. Anjali B. Raut

Keywords

Related Articles

Enhancing Route Quality In MANET Using Linear Optimization 

Mobile ad-hoc network is a constantly changing wireless network of autonomous nodes which communicate without the aid of any base station by routing the packets through intermediate nodes. As the nodes are mobile...

THERMAL ANALYSIS OF PRINTED CIRCUIT BOARD (PCB) OF AVIONICS EQUIPMENT  

As the power requirements of advanced aircrafts steadily move towards higher density and higher heat loads, Requirements of thermal analysis for advanced avionics are becoming more severe and critical to avionics des...

Survey on Data Sharing and Re-Encryption in Cloud 

Cloud storage helps enterprises and government agencies significantly reduce their financial overhead of data management, since they can now archive their data backups remotely to third-party cloud storage provider...

A 5 level, 3 phase H-bridge PWM method for I.M. Controlling with field oriented techniques  

This paper presents a micro controller based field oriented control 5-level inverter for three phase Induction motor. IGBT is used as power element. Pulse width modulation techniques (PWM), introduced three decad...

A Study on Autonomic Placement and Resource Management with Cloud Workloads  

With the advent of Cloud computing, with hosting and delivering the demanded services, enormous benefits were reaped by its users as capital expenditure on the computing resources is reduced to a very large exten...

Download PDF file
  • EP ID EP146608
  • DOI -
  • Views 75
  • Downloads 0

How To Cite

Abhijeet B. Potey, Prof. Anjali B. Raut (2013). Combating Sybil Attacks using SybilGuard . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(2), 452-455. https://europub.co.uk/articles/-A-146608