Novel Sybil Defense Scheme for Peer-to-peer Applications

被引:0
|
作者
Shamieh, Fuad [1 ]
Alharbi, Roa [1 ]
机构
[1] Univ Western Ontario, Dept Elect & Comp Engn, London, ON, Canada
关键词
component; peer-to-peer; proactive; sybil attack; OVERLAY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The importance of peer-to-peer (P2P) network overlays produced enormous interest in the research community due to their robustness, scalability, and increase of data availability. P2P networks are overlays of logically connected hosts and other nodes including servers. P2P networks allow users to share their files without the need for any centralized servers. Since P2P networks are largely constructed of end-hosts, they are susceptible to abuse and malicious activity, such as sybil attacks. Impostors perform sybil attacks by assigning nodes multiple addresses, as opposed to a single address, with the goal of degrading network quality. Sybil nodes will spread malicious data and provide bogus responses to requests. To prevent sybil attacks from occurring, a novel defense mechanism is proposed. In the proposed scheme, the DHT key-space is divided and treated in a similar manner to radio frequency allocation incensing. An overlay of trusted nodes is used to detect and handle sybil nodes with the aid of source-destination pairs reporting on each other. The simulation results show that the proposed scheme detects sybil nodes in large sized networks with thousands of interactions.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Fair Peer Assignment Scheme for Peer-to-Peer File Sharing
    Hu, Chih-Lin
    Chen, Da-You
    Chang, Yi-Hsun
    Chen, Yu-Wen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2010, 4 (05): : 709 - 735
  • [22] Applications of an advanced peer-to-peer platform
    Sunaga, H
    Takemoto, M
    Nakata, T
    THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS, 2003, : 210 - 211
  • [23] Developing peer-to-peer applications for the Internet
    Thomas, L
    Suchter, S
    Rifkin, A
    DR DOBBS JOURNAL, 1998, 23 (01): : 76 - &
  • [24] Security applications of peer-to-peer networks
    Vlachos, V
    Androutsellis-Theotokis, S
    Spinellis, D
    COMPUTER NETWORKS, 2004, 45 (02) : 195 - 205
  • [25] RMrun: peer-to-peer sharing of applications
    Pinto, Luis
    Santos, Tiago
    Araujo, Filipe
    IBERGRID: 2ND IBERIAN GRID INFRASTRUCTURE CONFERENCE PROCEEDINGS, 2008, : 397 - 406
  • [26] A measurement study of peer-to-peer applications
    Bin, Liu
    Li Zhitang
    Hao, Tu
    SECOND INTERNATIONAL CONFERENCE ON SPACE INFORMATION TECHNOLOGY, PTS 1-3, 2007, 6795
  • [27] Peer-to-peer - Technologies, architectures and applications
    Schoder, D
    Weinhardt, C
    WIRTSCHAFTSINFORMATIK, 2003, 45 (03): : 257 - 257
  • [28] Experimental evaluation of peer-to-peer applications
    Roberto Canonico
    Claudia Canali
    Walid Dabbous
    Peer-to-Peer Networking and Applications, 2013, 6 : 115 - 117
  • [29] Experimental evaluation of peer-to-peer applications
    Canonico, Roberto
    Canali, Claudia
    Dabbous, Walid
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2013, 6 (02) : 115 - 117
  • [30] Developing peer-to-peer applications for the Internet
    Thomas, Louis
    Suchter, Sean
    Rifkin, Adam
    Dr. Dobb's Journal of Software Tools for Professional Programmer, 1998, 23 (01):