2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2019
DOI: 10.1109/icccnt45670.2019.8944507
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Sybil Attack in Blockchain using Distributed Behavior Monitoring of Miners

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 52 publications
(32 citation statements)
references
References 22 publications
0
30
0
2
Order By: Relevance
“…In [18], Douceur discussed the Sybil attack on P2P systems. The P2P systems do not rely on a central trusted party chain of trust to verify the identity of each participant node, also relatively cheap to generate identities on P2P systems that treat equally on the network [26], [94].…”
Section: ) Sybil Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…In [18], Douceur discussed the Sybil attack on P2P systems. The P2P systems do not rely on a central trusted party chain of trust to verify the identity of each participant node, also relatively cheap to generate identities on P2P systems that treat equally on the network [26], [94].…”
Section: ) Sybil Attackmentioning
confidence: 99%
“…Additionally, blockchain systems include valuable digital assets that motivate the attackers to execute this attack. Once fake identities gain recognition in the blockchain system, the attacker interrupts the flow of information, out-votes (or block) the honest nodes, and refuses to receive or transmit information [24], [94]. The threats spectrum is increasing on blockchain systems, and the attacker has different motives to carry out this attack.…”
Section: ) Sybil Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…However, it is vulnerable to Denial of Service (DoS) and Sybil attacks [68]. A Sybil attacker can create many forged identities to break the trustworthiness of the system [98,99]. CryptoNote utilized a ring signature to provide viable anonymity benefits, but it brings higher computational complexity.…”
Section: Conceptual Research Designmentioning
confidence: 99%
“…Alachkar and Gaastra 78 studied existing solutions for the mitigation of Sybil attacks on I2P networks and showed that the state of these networks makes them subject to the Sybil attack. Several solutions have been proposed to identify and prevent Sybil attack, one can cite 79‐81 …”
Section: Related Workmentioning
confidence: 99%