Efficient Determent of Sybil Attacks in Blockchain | IEEE Conference Publication | IEEE Xplore

Efficient Determent of Sybil Attacks in Blockchain


Abstract:

Blockchain is rapidly growing in recent era with respect to digital transactions and supply chain. Due to lack of identity, blockchain are prone to more vulnerable attack...Show More

Abstract:

Blockchain is rapidly growing in recent era with respect to digital transactions and supply chain. Due to lack of identity, blockchain are prone to more vulnerable attacks. The private and public blockchain is adversely affected by fictitious nodes which creates fake identities and get circulated in the network. These fictitious nodes act as a genuine node and create superfluous influence on the network. There are various attacks in blockchain namely, DDOS attacks,51% attacks, Phishing attacks and Ransomware attacks etc., Monitoring a blockchain is a crucial process to ensure the network's health, security, and performance. Continuous monitoring the blockchain helps detect anomalies, potential attacks, or faults early on and allows for prompt intervention. The proposed solution keeps an eye on the node's behavior and route the blocks to other node. The malicious nodes are identified and removed from table, thus preventing sybil attack. The proposed system achieved better throughput.
Date of Conference: 20-22 January 2025
Date Added to IEEE Xplore: 27 February 2025
ISBN Information:
Conference Location: Erode, India

1 Introduction

The definition of a blockchain is “a distributed database that keeps an ever-expanding list of ordered records, called blocks.[1]” Cryptography is used to bind these blocks together. Each block has transaction data, a timestamp, and a cryptographic hash of the block before it. The fundamental concepts of blockchain technology-transparency, immutability, and decentralization-have transformed a wide range of sectors. Nevertheless, malevolent actors may make use of these very advantages. The Sybil attack, which takes its name from a historical case study involving dissociative identity disorder, is one such threat. It is used in the context of blockchain technology and entails a single entity in charge of a sizable number of fictitious identities, or sybil nodes. It occurs when a hacker takes on multiple false identities, or “Sybil nodes,” to gain control of a system or network [1]. The attacker can alter the system's decision-making processes and upset its equilibrium because the network views these nodes as authentic.

Contact IEEE to Subscribe

References

References is not available for this document.