SybilControl: Practical Sybil Defense With Computational Puzzles

Provided by: Association for Computing Machinery
Topic: Mobility
Format: PDF
Many distributed systems are subject to the Sybil attack, where an adversary subverts system operation by emulating the behavior of multiple distinct nodes. Most recent works addressing this problem leverage social networks to establish trust relationships between users. However, social networks are not appropriate in all systems. They can be subverted by social engineering techniques, require nodes to maintain and be aware of social network information, and may require overly optimistic assumptions about the fast-mixing nature of social links. This paper explores an alternate approach. The authors present Sybil-Control, a novel decentralized scheme for controlling the extent of Sybil attacks.

Find By Topic