Detecting Sybil Nodes in Static and Dynamic Networks

被引:0
|
作者
Cardenas-Haro, Jose Antonio [1 ]
Konjevod, Goran [1 ]
机构
[1] Arizona State Univ, Sch Comp Informat & Decis Syst Engn, Tempe, AZ 85287 USA
关键词
Distributed Systems; Sybil attack; Network security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer systems are known to be vulnerable to the Sybil attack. The lack of a central authority allows a malicious user to create many fake identities (called Sybil nodes) pretending to be independent honest nodes. The goal of the malicious user is to influence the system on his/her behalf. In order to detect the Sybil nodes and prevent the attack, we use here a reputation system for every node, built through observing its interactions with its peers. The construction makes every node a part of a distributed authority that keeps records on the reputation and behavior of the nodes. Records of interactions between nodes are broadcast by the interacting nodes and honest reporting proves to be a Nash Equilibrium for correct (non-Sybil) nodes. We argue that in realistic communication schedule scenarios, simple graph-theoretic queries help in exposing those nodes most likely to be Sybil.
引用
收藏
页码:894 / 917
页数:24
相关论文
共 50 条
  • [1] An Analysis of Graph Properties for Detecting Sybil Nodes in Social Networks
    Kaewking, Korkiat
    Boonkrong, Sirapat
    JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2018, 12 (02) : 185 - 205
  • [2] Detecting Sybil Nodes in Wireless Networks with Physical Layer Network Coding
    Wang, Weichao
    Pu, Di
    Wyglinski, Alex
    2010 IEEE-IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS DSN, 2010, : 21 - 30
  • [3] A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks
    Jamshidi, Mojtaba
    Zangeneh, Ehsan
    Esnaashari, Mehdi
    Meybodi, Mohammad Reza
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 64 : 220 - 232
  • [4] Detecting Sybil Nodes in Anonymous Communication Systems
    Zang, Wenyu
    Zhang, Peng
    Wang, Xiao
    Shi, Jinqiao
    Guo, Li
    FIRST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, 2013, 17 : 861 - 869
  • [5] Detecting Sybil nodes in stationary wireless sensor networks using learning automaton and client puzzles
    Jamshidi, Mojtaba
    Esnaashari, Mehdi
    Darwesh, Aso Mohammad
    Meybodi, Mohammad Reza
    IET COMMUNICATIONS, 2019, 13 (13) : 1988 - 1997
  • [6] Adaptive Algorithms for Detecting Critical Links and Nodes in Dynamic Networks
    Shen, Yilin
    Dinh, Thang N.
    Thai, My T.
    2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
  • [7] Detection of Sybil Nodes in Mobile Sensor Networks Using the Context of Nodes Mobility
    Almas-Shehni, Rezvan
    Faez, Karim
    COMPUTER NETWORKS AND DISTRIBUTED SYSTEMS, CNDS 2013, 2014, 428 : 117 - 128
  • [8] Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks
    Lv, Shaohe
    Wang, Xiaodong
    Zhao, Xin
    Zhou, Xingming
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 442 - 446
  • [9] Detecting the sybil attack in mobile ad hoc networks
    Piro, Chris
    Shields, Clay
    Levine, Brian Neil
    2006 SECURECOMM AND WORKSHOPS, 2006, : 285 - +
  • [10] Footprint: Detecting Sybil Attacks in Urban Vehicular Networks
    Chang, Shan
    Qi, Yong
    Zhu, Hongzi
    Zhao, Jizhong
    Shen, Xuemin
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (06) : 1103 - 1114