35
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Review of Techniques to Mitigate Sybil Attacks

      Preprint

      Read this article at

          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Any decentralised distributed network is particularly vulnerable to the Sybil attack wherein a malicious node masquerades as several different nodes, called Sybil nodes, simultaneously in an attempt to disrupt the proper functioning of the network. Such attacks may cause damage on a fairly large scale especially since they are difficult to detect and there has been no universally accepted scheme to counter them as yet. In this paper, we discuss the different kinds of Sybil attacks including those occurring in peer-to-peer reputation systems, self-organising networks and even social network systems. In addition, various methods that have been suggested over time to decrease or eliminate their risk completely are also analysed along with their modus operandi.

          Related collections

          Most cited references10

          • Record: found
          • Abstract: not found
          • Article: not found

          Secure routing in wireless sensor networks: attacks and countermeasures

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            The sybil attack in sensor networks

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Remote Physical Device Fingerprinting

                Bookmark

                Author and article information

                Journal
                1207.2617

                Security & Cryptology
                Security & Cryptology

                Comments

                Comment on this article