International Journal of Advanced Research in Computer Engineering & Technology
In this paper, the authors present a Sybil Guard, for combating against Sybil attacks without relying on a trusted central authority. Peer-To-Peer and other decentralized, distributed systems are known to be particularly open to Sybil attacks. In a Sybil attack, a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. Among the small number of decentralized approaches, their recent Sybil Guard leverages a key insight on social networks to bind the number of Sybil nodes accepted. Despite its promising direction, Sybil Guard can allow a large number of Sybil nodes to be accepted. Furthermore, Sybil Guard assumes that social networks are fast-mixing, which has never been confirmed in the real world.