The Sybil attack, which creates a large amount of fake node identities to break the normal routing process in the peer-to-peer (P2P) networks, is the main threat faced by distributed networks. A Social-DHT protocol was developed using the properties of social relationships to mitigate Sybil attacks in distributed Hash table (DHT) networks using random walks over the social relationships. In addition, a model is given using a formalized definition to analyze the successful probability of searches. Simulations show that the Social-DHT routing table includes less than 3% of the Sybil nodes when there are 10000 attack edges and the successful search ratio reaches 99%, which is better than existing methods.EI011-75
SUMMARY The social network model has been re-garded as a promising mechanism to defend against Sybil...
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to...
Abstract—Distributed hash tables (DHT) are a key building block for modern P2P content-distribution ...
Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Whānau is a novel routing protocol for distributed hash tables (DHTs) that is efficient and strong...
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention e...
P2P systems are highly susceptible to Sybil attacks, in which an attacker creates a large number of ...
P2P systems are inherently vulnerable to Sybil attacks, in which an attacker can have a large number...
A Sybil attack is one of the main challenges to be addressed when securing peer-to-peer networks, es...
A Sybil attack is one of the main challenges to be addressed when securing peer-to-peer networks, es...
A Sybil attack is one of the main challenges to be addressed when securing peer-to-peer networks, es...
Peer-to-peer networks based on Distributed Hash Tables (DHTs) have received considerable at-tention ...
Abstract—Lacking trusted central authority, distributed sys-tems have received serious security thre...
Abstract—Lacking trusted central authority, distributed sys-tems have received serious security thre...
SUMMARY The social network model has been re-garded as a promising mechanism to defend against Sybil...
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to...
Abstract—Distributed hash tables (DHT) are a key building block for modern P2P content-distribution ...
Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Whānau is a novel routing protocol for distributed hash tables (DHTs) that is efficient and strong...
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention e...
P2P systems are highly susceptible to Sybil attacks, in which an attacker creates a large number of ...
P2P systems are inherently vulnerable to Sybil attacks, in which an attacker can have a large number...
A Sybil attack is one of the main challenges to be addressed when securing peer-to-peer networks, es...
A Sybil attack is one of the main challenges to be addressed when securing peer-to-peer networks, es...
A Sybil attack is one of the main challenges to be addressed when securing peer-to-peer networks, es...
Peer-to-peer networks based on Distributed Hash Tables (DHTs) have received considerable at-tention ...
Abstract—Lacking trusted central authority, distributed sys-tems have received serious security thre...
Abstract—Lacking trusted central authority, distributed sys-tems have received serious security thre...
SUMMARY The social network model has been re-garded as a promising mechanism to defend against Sybil...
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to...
Abstract—Distributed hash tables (DHT) are a key building block for modern P2P content-distribution ...