Blog
About

25
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Review of Techniques to Mitigate Sybil Attacks

      Preprint

      ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Any decentralised distributed network is particularly vulnerable to the Sybil attack wherein a malicious node masquerades as several different nodes, called Sybil nodes, simultaneously in an attempt to disrupt the proper functioning of the network. Such attacks may cause damage on a fairly large scale especially since they are difficult to detect and there has been no universally accepted scheme to counter them as yet. In this paper, we discuss the different kinds of Sybil attacks including those occurring in peer-to-peer reputation systems, self-organising networks and even social network systems. In addition, various methods that have been suggested over time to decrease or eliminate their risk completely are also analysed along with their modus operandi.

          Related collections

          Most cited references 12

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          The Sybil Attack

           John Douceur (2002)
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Secure routing in wireless sensor networks: attacks and countermeasures

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              The sybil attack in sensor networks

                Bookmark

                Author and article information

                Journal
                11 July 2012
                Article
                1207.2617

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                Custom metadata
                6 pages, 1 table
                cs.CR

                Comments

                Comment on this article