1 Introduction
The definition of a blockchain is “a distributed database that keeps an ever-expanding list of ordered records, called blocks.[1]” Cryptography is used to bind these blocks together. Each block has transaction data, a timestamp, and a cryptographic hash of the block before it. The fundamental concepts of blockchain technology-transparency, immutability, and decentralization-have transformed a wide range of sectors. Nevertheless, malevolent actors may make use of these very advantages. The Sybil attack, which takes its name from a historical case study involving dissociative identity disorder, is one such threat. It is used in the context of blockchain technology and entails a single entity in charge of a sizable number of fictitious identities, or sybil nodes. It occurs when a hacker takes on multiple false identities, or “Sybil nodes,” to gain control of a system or network [1]. The attacker can alter the system's decision-making processes and upset its equilibrium because the network views these nodes as authentic.