A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Detecting Sybil Nodes in Static and Dynamic Networks
[chapter]
2010
Lecture Notes in Computer Science
Peer-to-peer systems are known to be vulnerable to the Sybil attack. The lack of a central authority allows a malicious user to create many fake identities (called Sybil nodes) pretending to be independent honest nodes. The goal of the malicious user is to influence the system on his/her behalf. In order to detect the Sybil nodes and prevent the attack, a reputation system is used for the nodes, built through observing its interactions with its peers. The construction makes every node a part of
doi:10.1007/978-3-642-16949-6_15
fatcat:4tmhb5nw3zd6dizukrwxl3fju4