2016
DOI: 10.1016/j.jnca.2016.05.014
|View full text |Cite
|
Sign up to set email alerts
|

iPersea: Towards improving the Sybil-resilience of social DHT

Abstract: a b s t r a c t P2P systems are highly susceptible to Sybil attacks, in which an attacker creates a large number of identities and uses them to control a substantial fraction of the system. Persea is the most recent approach towards designing a social network based Sybil-resistant DHT. Unlike prior Sybil-resistant P2P systems based on social networks, Persea does not rely on two key assumptions: (i) that the social network is fast mixing, and (ii) that there is a small ratio of attack edges to honest peers. Bo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 27 publications
(22 reference statements)
0
1
0
Order By: Relevance
“…The Sybil attack is still investigated nowadays, as demonstrated by some recent works such as [17,18]. In [17] the authors focus on solving a limitation of Persea through lookup inspection for detecting the sybils, while the latter presents VoteTrust, a system to detect sybils through the friend invitation graph of social networks. However, both of these systems focus on sybils detection.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The Sybil attack is still investigated nowadays, as demonstrated by some recent works such as [17,18]. In [17] the authors focus on solving a limitation of Persea through lookup inspection for detecting the sybils, while the latter presents VoteTrust, a system to detect sybils through the friend invitation graph of social networks. However, both of these systems focus on sybils detection.…”
Section: Background and Related Workmentioning
confidence: 99%