Novel Sybil Defense Scheme for Peer-to-peer Applications

被引:0
|
作者
Shamieh, Fuad [1 ]
Alharbi, Roa [1 ]
机构
[1] Univ Western Ontario, Dept Elect & Comp Engn, London, ON, Canada
关键词
component; peer-to-peer; proactive; sybil attack; OVERLAY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The importance of peer-to-peer (P2P) network overlays produced enormous interest in the research community due to their robustness, scalability, and increase of data availability. P2P networks are overlays of logically connected hosts and other nodes including servers. P2P networks allow users to share their files without the need for any centralized servers. Since P2P networks are largely constructed of end-hosts, they are susceptible to abuse and malicious activity, such as sybil attacks. Impostors perform sybil attacks by assigning nodes multiple addresses, as opposed to a single address, with the goal of degrading network quality. Sybil nodes will spread malicious data and provide bogus responses to requests. To prevent sybil attacks from occurring, a novel defense mechanism is proposed. In the proposed scheme, the DHT key-space is divided and treated in a similar manner to radio frequency allocation incensing. An overlay of trusted nodes is used to detect and handle sybil nodes with the aid of source-destination pairs reporting on each other. The simulation results show that the proposed scheme detects sybil nodes in large sized networks with thousands of interactions.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Peer-to-peer video delivery scheme for large scale video-on-demand applications
    Huang, SY
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (12) : 3621 - 3626
  • [42] Legitimate applications of peer-to-peer networks.
    Soares, A
    JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2006, 57 (02): : 293 - 294
  • [43] A “cluster” based search scheme in peer-to-peer network
    Li Zhen-wu
    Yang Jian
    Shi Xu-dong
    Bai Ying-cai
    Journal of Zhejiang University-SCIENCE A, 2003, 4 (5): : 549 - 554
  • [44] Mobile web services for peer-to-peer applications
    Gehlen, G
    Pham, L
    CCNC: 2005 2ND IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2005, : 427 - 433
  • [45] Hybrid peer-to-peer model in proximity applications
    Thelliez, M
    Delot, T
    Lecomte, S
    Bennani, N
    AINA 2003: 17TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2003, : 306 - 309
  • [46] Efficient search scheme in mobile peer-to-peer network
    Zhang, Liyuan
    Liu, Jie
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 1235 - 1238
  • [47] AN INTEREST MANAGEMENT SCHEME FOR MOBILE PEER-TO-PEER SYSTEMS
    Li, Ying
    Fujimoto, Richard
    Hunter, Michael
    Suh, Wonho
    PROCEEDINGS OF THE 2011 WINTER SIMULATION CONFERENCE (WSC), 2011, : 2747 - 2759
  • [48] A Distributed Hybrid Scheme for Unstructured Peer-to-Peer Networks
    Tang, Yong
    Zhang, Zhan
    Chen, Shigang
    Fan, Guangbin
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 30 - 35
  • [49] ZIGZAG: An efficient peer-to-peer scheme for media streaming
    Tran, DA
    Hua, KA
    Do, T
    IEEE INFOCOM 2003: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2003, : 1283 - 1292
  • [50] A "cluster" based search scheme in peer-to-peer network
    李振武
    杨舰
    史旭东
    白英彩
    Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2003, (05) : 48 - 53