Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self-Registration
2012 Seventh International Conference on Availability, Reliability and Security (2006)
Apr. 20, 2006 to Apr. 22, 2006
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/ARES.2006.45
Jochen Dinger , Universitat Karlsruhe (TH), Germany
Hannes Hartenstein , Universitat Karlsruhe (TH), Germany
The robustness of Peer-to-Peer (P2P) networks, in particular of DHT-based overlay networks, suffers significantly when a Sybil attack is performed. We tackle the issue of Sybil attacks from two sides. First, we clarify, analyze, and classify the P2P identifier assignment process. By clearly separating network participants from network nodes, two challenges of P2P networks under a Sybil attack become obvious: i) stability over time, and ii) identity differentiation. Second, as a starting point for a quantitative analysis of time-stability of P2P networks under Sybil attacks and under some assumptions with respect to identity differentiation, we propose an identity registration procedure called self-registration that makes use of the inherent distribution mechanisms of a P2P network.
Jochen Dinger, Hannes Hartenstein, "Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self-Registration", 2012 Seventh International Conference on Availability, Reliability and Security, vol. 00, no. , pp. 756-763, 2006, doi:10.1109/ARES.2006.45