Whanaungatanga: Sybil-proof routing with social networks
نویسندگان
چکیده
Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed hash table that is strongly resistant to the Sybil attack. This is the first solution to this problem with sublinear run time and space usage. The protocol uses the social connections between users to build routing tables that enable Sybil-resistant distributed hash table lookups. With a social network ofnwell-connected honest nodes, the protocol can tolerate up to O(n/ logn) “attack edges” (social links from honest users to phoney identities). This means that an adversary has to fool a large fraction of the honest users before any lookups will fail. The protocol builds routing tables that containO( √ n log n) entries per node. Lookups take O(1) time. Simulation results, using social network graphs from LiveJournal, Flickr, and YouTube confirm the analytical results.
منابع مشابه
A Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملTowards Sybil-resilient P2P Networks
Recently, Sybil attack has become one of the most visible security problems in the peer to peer networks where it is not possible to depend on trusted authorities for admission control or maintenance. In such networks or in any open distributed systems, an adversary creates many fake identities in order to increase its influence and deny service to honest participants. Defending against this at...
متن کاملWhanau: A Sybil-proof Distributed Hash Table
Whānau is a novel routing protocol for distributed hash tables (DHTs) that is efficient and strongly resistant to the Sybil attack. Whānau uses the social connections between users to build routing tables that enable Sybil-resistant lookups. The number of Sybils in the social network does not affect the protocol’s performance, but links between honest users and Sybils do.When there are n well-c...
متن کاملOn the Sybil-Proofness of Accounting Mechanisms
A common challenge in distributed work systems like P2P file-sharing communities, or ad-hoc routing networks, is to minimize the number of free-riders and incentivize contributions. Without any centralized monitoring it is difficult to distinguish contributors from free-riders. One way to address this problem is via accounting mechanisms which rely on voluntary reports by individual agents and ...
متن کامل