Detecting Sybil Nodes in Static and Dynamic Networks

被引:0
|
作者
Cardenas-Haro, Jose Antonio [1 ]
Konjevod, Goran [1 ]
机构
[1] Arizona State Univ, Sch Comp Informat & Decis Syst Engn, Tempe, AZ 85287 USA
关键词
Distributed Systems; Sybil attack; Network security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer systems are known to be vulnerable to the Sybil attack. The lack of a central authority allows a malicious user to create many fake identities (called Sybil nodes) pretending to be independent honest nodes. The goal of the malicious user is to influence the system on his/her behalf. In order to detect the Sybil nodes and prevent the attack, we use here a reputation system for every node, built through observing its interactions with its peers. The construction makes every node a part of a distributed authority that keeps records on the reputation and behavior of the nodes. Records of interactions between nodes are broadcast by the interacting nodes and honest reporting proves to be a Nash Equilibrium for correct (non-Sybil) nodes. We argue that in realistic communication schedule scenarios, simple graph-theoretic queries help in exposing those nodes most likely to be Sybil.
引用
收藏
页码:894 / 917
页数:24
相关论文
共 50 条
  • [21] Detecting Sybil attacks in Wireless Sensor Networks using neighboring information
    Ssu, Kuo-Feng
    Wang, Wei-Tong
    Chang, Wen-Chung
    COMPUTER NETWORKS, 2009, 53 (18) : 3042 - 3056
  • [22] Detecting Errors in Nodes of Technical Systems with Static Nonlinearities
    B. P. Podkopaev
    A. S. Yakshin
    Automation and Remote Control, 2019, 80 : 1428 - 1436
  • [23] Detecting Errors in Nodes of Technical Systems with Static Nonlinearities
    Podkopaev, B. P.
    Yakshin, A. S.
    AUTOMATION AND REMOTE CONTROL, 2019, 80 (08) : 1428 - 1436
  • [24] A GRAPHICAL METHOD FOR DETECTING BOTH STATIC AND DYNAMIC RANDOM COMPONENTS IN COMBINATORIAL NETWORKS
    DAVID, R
    AUTOMATISME, 1969, 14 (11): : 554 - &
  • [25] DETECTING SYBIL ATTACKS IN WIRELESS SENSOR NETWORKS USING SEQUENTIAL ANALYSIS
    Vamsi, P. Raghu
    Kant, Krishna
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2016, 9 (02): : 651 - 680
  • [26] Detecting Sybil Attacks in Wireless and Sensor Networks Using Cluster Analysis
    Yang, Jie
    Chen, Yingying
    Trappe, Wade
    2008 FIFTH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2008, : 834 - +
  • [27] Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad Hoc Networks
    Bochem, Arne
    Leiding, Benjamin
    Hogrefe, Dieter
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 358 - 374
  • [28] A collaborative strategy for detection and eviction of Sybil attacker and Sybil nodes in VANET
    Krishnan, Remya P.
    Kumar, Arun Raj P.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (03)
  • [29] Detecting termination in static and dynamic systems
    Ye, XF
    Keane, JA
    INFORMATION INTELLIGENCE AND SYSTEMS, VOLS 1-4, 1996, : 2194 - 2199
  • [30] Detecting Sybil attacks in VANETs
    Yu, Bo
    Xu, Cheng-Zhong
    Xiao, Bin
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2013, 73 (06) : 746 - 756