SybilConf: Computational Puzzles for Confining Sybil Attacks

2010 | Konferenzbeitrag

Spring zu: Zitieren & Links | Dokumente & Medien | Details | Versionsgeschichte

Zitiervorschlag

​SybilConf: Computational Puzzles for Confining Sybil Attacks​
Tegeler, F.   & Fu, X. ​ (2010)
​INFOCOM IEEE Conference on Computer Communications Workshops pp. 1​-2. , San Diego, CA, USA.
IEEE. DOI: https://doi.org/10.1109/INFCOMW.2010.5466685 

Dokumente & Medien

Lizenz

GRO License GRO License

Details

Autor(en)
Tegeler, Florian ; Fu, Xiaoming 
Zusammenfassung
In decentralized dynamic networks such as peer-to-peer networks, it is difficult to authorize identities without a centralized authority, since a node interacts with nodes previously unknown to itself. To optimize the quality of experience and exclude malicious nodes from such networks, various trust and reputation systems (TRS) have been proposed. However, most of these TRSs rely on properties such as trust attributed to certain persistent identities and the bootstrapping is difficult without a central trusted instance. Hence, TRSs are vulnerable to sybil attacks [1], where a number of artificial identities can be used by some malicious entity to compromise probabilistic protection mechanisms. These mechanisms usually rely on the assumption that most nodes in a network behave well. Unfortunately, this is not the case if an attacker maintains numerous identities. We present SybilConf, a simple scheme to increase costs for maintaining an identity, thus reducing the sybil attack's impact. The basic idea is to combine public/ private keying with a novel puzzle creation algorithm to enable a flexible, strong and identity-bound sybil protection.
Erscheinungsdatum
2010
Herausgeber
IEEE
ISBN
978-1-4244-6739-6
Veranstaltungsort
San Diego, CA, USA
Veranstaltungsstart
2010-03-15
Veranstaltungsende
2010-03-19
Sprache
Englisch

Export Metadaten

Referenzen

Zitationen


Social Media