Sciweavers

98 search results - page 1 / 20
» Limiting Sybil Attacks in Structured P2P Networks
Sort
View
INFOCOM
2007
IEEE
13 years 11 months ago
Limiting Sybil Attacks in Structured P2P Networks
— One practical limitation of structured peer-to-peer (P2P) networks is that they are frequently subject to Sybil attacks: malicious parties can compromise the network by generat...
Hosam Rowaihy, William Enck, Patrick McDaniel, Tom...
ISCC
2008
IEEE
13 years 11 months ago
A sybilproof distributed identity management for P2P networks
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in ...
François Lesueur, Ludovic Mé, Val&ea...
AIMS
2009
Springer
13 years 10 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
P2P
2009
IEEE
112views Communications» more  P2P 2009»
14 years 1 days ago
SyMon: Defending large structured P2P systems against Sybil Attack
Sybil attack is one of the most challenging problems that plague current decentralized Peer-to-Peer systems. In Sybil attack, a single malicious user creates multiple peer identit...
B. S. Jyothi, D. Janakiram
TKDE
2010
272views more  TKDE 2010»
13 years 3 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta