Detecting Sybil Nodes in Static and Dynamic Networks

被引:0
|
作者
Cardenas-Haro, Jose Antonio [1 ]
Konjevod, Goran [1 ]
机构
[1] Arizona State Univ, Sch Comp Informat & Decis Syst Engn, Tempe, AZ 85287 USA
来源
ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2010, PT II | 2010年 / 6427卷
关键词
Distributed Systems; Sybil attack; Network security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer systems are known to be vulnerable to the Sybil attack. The lack of a central authority allows a malicious user to create many fake identities (called Sybil nodes) pretending to be independent honest nodes. The goal of the malicious user is to influence the system on his/her behalf. In order to detect the Sybil nodes and prevent the attack, we use here a reputation system for every node, built through observing its interactions with its peers. The construction makes every node a part of a distributed authority that keeps records on the reputation and behavior of the nodes. Records of interactions between nodes are broadcast by the interacting nodes and honest reporting proves to be a Nash Equilibrium for correct (non-Sybil) nodes. We argue that in realistic communication schedule scenarios, simple graph-theoretic queries help in exposing those nodes most likely to be Sybil.
引用
收藏
页码:894 / 917
页数:24
相关论文
共 50 条
  • [31] Defending against Sybil Nodes in BitTorrent
    So, Jung Ki
    Reeves, Douglas S.
    NETWORKING 2011, PT II, 2011, 6641 : 25 - 39
  • [32] Detecting compromised nodes in wireless sensor networks
    Mathews, Mary
    Song, Min
    Shetty, Sachin
    McKenzie, Rick
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 273 - +
  • [33] Detecting controlling nodes of boolean regulatory networks
    Schober, Steffen
    Kracht, David
    Heckel, Reinhard
    Bossert, Martin
    EURASIP JOURNAL ON BIOINFORMATICS AND SYSTEMS BIOLOGY, 2011, (01):
  • [34] Detecting responsible nodes in differential Bayesian networks
    Huang, Xianzheng
    Zhang, Hongmei
    STATISTICS IN MEDICINE, 2024, 43 (17) : 3294 - 3312
  • [35] Detecting phantom nodes in wireless sensor networks
    Hwang, Joengmin
    He, Tian
    Kifn, Yongdae
    INFOCOM 2007, VOLS 1-5, 2007, : 2391 - +
  • [36] Detecting Sybil Attacks in Mobile Wireless Sensor Networks Based on ID Frequency
    Cheng, Ying-ying
    Huang, He-jiao
    Du, Hong-wei
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 330 - 334
  • [37] Detecting Sybil Attack based on State Information in Underwater Wireless Sensor Networks
    Li, Xun
    Han, Guangjie
    Qian, Aihua
    Shu, Lei
    Rodrigues, Joel
    2013 21ST INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM 2013), 2013, : 116 - 120
  • [38] Energy Trust System for Detecting Sybil Attack in Clustered Wireless Sensor Networks
    Alsaedi, Noor
    Hashim, Fazirulhisyam
    Sali, A.
    2015 IEEE 12TH MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS (MICC), 2015, : 91 - 95
  • [39] On Identifying Power Control Performing Sybil Nodes in Wireless Sensor Networks Using RSSI
    Misra, Satyajayant
    Myneni, Sowmya
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [40] Cod ng Observer Nodes for Sybil Attacks Detection in Mobile Wireless Sensor Networks
    Sassani , Bahman A.
    Alomirah, Abdulaziz
    Pang, Shaning
    Sarrafpour, Soshian
    2021 IEEE 19TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2021), 2021, : 87 - 94