By Topic

Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Hota, C. ; Birla Inst. of Technol. & Sci., Pilani ; Srikanth, M.S.V. ; Yla-Jaaski, A. ; Lindqvist, J.
more authors

Peer-to-peer (P2P) overlay networks are currently being used to build large scale distributed systems running various decentralized applications like distributed storage, content distribution, collaborative scheduling, and leader election. Although we have protocols like Byzantine agreement, voting schemes etc. for building resilient distributed applications; we have very few solutions available for safeguarding these distributed protocols from Sybil attacks. In a Sybil attack, an adversary could forge multiple identities and create multiple, distinct nodes in the system hence overthrowing any upper bound on number of malicious nodes in these protocols. In this paper, we present a multipath routing protocol using graph theoretic approach to group the Sybil nodes first and then to poll them using host identity protocol (HIP) to decide upon whether they really belong to a Sybil group. HIP clearly separates participating users from overlay nodes. It overcomes P2P network challenges like stability over time and identity differentiation. We also use a social network where the attack edges are minimum. An attack edge between a malicious user and an honest user indicates that the malicious user is able to establish a trust relationship with the honest user by some means. We perform simulations to show the feasibility of our distributed protocol.

Published in:

Communications and Networking in China, 2007. CHINACOM '07. Second International Conference on

Date of Conference:

22-24 Aug. 2007