2006
DOI: 10.1007/s00446-006-0012-y
|View full text |Cite
|
Sign up to set email alerts
|

On the establishment of distinct identities in overlay networks

Abstract: We study ways to restrict or prevent the damage that can be caused in a peer-to-peer network by corrupt entities creating multiple pseudonyms. We show that it is possible to remotely issue certificates that can be used to test the distinctness of identities. Our certification protocols are based on geometric techniques that establish location information in a fault-tolerant and distributed fashion. They do not rely on a centralized certifying authority or infrastructure that has direct knowledge of entities in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
39
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 29 publications
(39 citation statements)
references
References 19 publications
(27 reference statements)
0
39
0
Order By: Relevance
“…Sastry et al [18] presented an early version of a protocol that verifies node locations and bases node identities on their location information. Similar ideas were also proposed by Waters and Felten [20], Bazzi and Konjevod [2] andČapkun and Hubaux [4,5]. In the most general form, these works are based on measuring the delays incurred by communications between nodes and imposing a geometric structure on the "distance space" to determine node locations.…”
Section: Existing Workmentioning
confidence: 93%
See 4 more Smart Citations
“…Sastry et al [18] presented an early version of a protocol that verifies node locations and bases node identities on their location information. Similar ideas were also proposed by Waters and Felten [20], Bazzi and Konjevod [2] andČapkun and Hubaux [4,5]. In the most general form, these works are based on measuring the delays incurred by communications between nodes and imposing a geometric structure on the "distance space" to determine node locations.…”
Section: Existing Workmentioning
confidence: 93%
“…Remarkably, this intuition, while it appears key in the mobile setting, is of little use in the static case. Thus, it forms a complement to the location-and-delay based certification mechanisms of Bazzi and Konjevod [2] which were limited to the static setting. In fact, the basic observation that a pair of independent users of a mobile ad-hoc network will frequently be seen simultaneously in different locations in the network, while a Sybil node is never seen far from its "master", forms the foundation for this research as well.…”
Section: Existing Workmentioning
confidence: 99%
See 3 more Smart Citations