Douceur, 2002

The Sybil Attack

Type

Article

Year

2002

Authors

Douceur, J.R.

Identifiers

Publication

Peer-to-Peer Systems, Lecture Notes in Computer Science. Springer Berlin Heidelberg, Berlin, Heidelberg, pp.

Pages

251–260

Abstract

Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these “Sybil attacks” is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.

(https://open-measure.atlassian.net/wiki/spaces/BIB/pages/1254588522, p. 1)

Citation

Douceur, J.R., 2002. The Sybil Attack, in: Druschel, P., Kaashoek, F., Rowstron, A. (Eds.), Peer-to-Peer Systems, Lecture Notes in Computer Science. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 251–260. https://doi.org/10.1007/3-540-45748-8_24

 


Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.


This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.