A Sybil attack is one of the main challenges to be addressed when securing peer-to-peer networks, especially those based on Distributed Hash Tables (DHTs). Tampering routing tables by means of multiple fake identities can make routing, storing, and retrieving operations significantly more difficult and time-consuming. Countermeasures based on trust and reputation have already proven to be effective in some contexts, but one variant of the Sybil attack, the Spartacus attack, is emerging as a new threat and its effects are even riskier and more difficult to stymie. In this paper, we first improve a well-known and deployed DHT (Chord) through a solution mixing trust with standard operations, for facing a Sybil attack affecting either routing o...
Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
P2P systems are inherently vulnerable to Sybil attacks, in which an attacker can have a large number...
A Sybil attack is one of the main challenges to be addressed when securing peer-to-peer networks, es...
A Sybil attack is one of the main challenges to be addressed when securing peer-to-peer networks, es...
Withstanding multiple false identities, also known as a Sybil attack, is one of the main challenges ...
Peer-to-peer architectures have become very popular in the last years for a variety of services and ...
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention e...
The Sybil attack, which creates a large amount of fake node identities to break the normal routing p...
Peer-to-peer networks based on Distributed Hash Tables (DHTs) have received considerable at-tention ...
Abstract—The Sybil attack is one of the most harmful security threats for distributed hash tables (D...
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to...
Distributed hash tables (DHTs) provide efficient and scalable lookup mechanisms for locating data in...
Abstract—Distributed hash tables (DHT) are a key building block for modern P2P content-distribution ...
Abstract — Sybil attack is one of the most challenging problems in Peer-to-Peer networks. The huge n...
Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
P2P systems are inherently vulnerable to Sybil attacks, in which an attacker can have a large number...
A Sybil attack is one of the main challenges to be addressed when securing peer-to-peer networks, es...
A Sybil attack is one of the main challenges to be addressed when securing peer-to-peer networks, es...
Withstanding multiple false identities, also known as a Sybil attack, is one of the main challenges ...
Peer-to-peer architectures have become very popular in the last years for a variety of services and ...
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention e...
The Sybil attack, which creates a large amount of fake node identities to break the normal routing p...
Peer-to-peer networks based on Distributed Hash Tables (DHTs) have received considerable at-tention ...
Abstract—The Sybil attack is one of the most harmful security threats for distributed hash tables (D...
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to...
Distributed hash tables (DHTs) provide efficient and scalable lookup mechanisms for locating data in...
Abstract—Distributed hash tables (DHT) are a key building block for modern P2P content-distribution ...
Abstract — Sybil attack is one of the most challenging problems in Peer-to-Peer networks. The huge n...
Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
P2P systems are inherently vulnerable to Sybil attacks, in which an attacker can have a large number...