A survey of DHT security techniques

G Urdaneta, G Pierre, MV Steen - ACM Computing Surveys (CSUR), 2011 - dl.acm.org
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable
attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been …

Systematizing decentralization and privacy: Lessons from 15 years of research and deployments

C Troncoso, M Isaakidis, G Danezis… - arXiv preprint arXiv …, 2017 - arxiv.org
Decentralized systems are a subset of distributed systems where multiple authorities control
different components and no authority is fully trusted by all. This implies that any component …

Sybillimit: A near-optimal social network defense against sybil attacks

H Yu, PB Gibbons, M Kaminsky… - 2008 IEEE Symposium …, 2008 - ieeexplore.ieee.org
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable
to sybil attacks, where a malicious user pretends to have multiple identities (called sybil …

Sybilguard: defending against sybil attacks via social networks

H Yu, M Kaminsky, PB Gibbons… - Proceedings of the 2006 …, 2006 - dl.acm.org
Peer-to-peer and other decentralized, distributed systems are known to be particularly
vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities …

[PDF][PDF] Sybilinfer: Detecting sybil nodes using social networks.

G Danezis, P Mittal - Ndss, 2009 - crysp.uwaterloo.ca
SybilInfer is an algorithm for labelling nodes in a social network as honest users or Sybils
controlled by an adversary. At the heart of SybilInfer lies a probabilistic model of honest …

[PDF][PDF] Sybil-Resilient Online Content Voting.

DN Tran, B Min, J Li, L Subramanian - NSDI, 2009 - usenix.org
Obtaining user opinion (using votes) is essential to ranking user-generated online content.
However, any content voting system is susceptible to the Sybil attack where adversaries can …

Sybilguard: defending against sybil attacks via social networks

H Yu, M Kaminsky, PB Gibbons… - IEEE/ACM Transactions …, 2008 - ieeexplore.ieee.org
Peer-to-peer and other decentralized, distributed systems are known to be particularly
vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities …

[PDF][PDF] A survey of solutions to the sybil attack

BN Levine, C Shields, NB Margolin - University of Massachusetts …, 2006 - git.gnunet.org
Many security mechanisms are based on specific assumptions of identity and are vulnerable
to attacks when these assumptions are violated. For example, impersonation is the well …

A survey of secure internet of things in relation to blockchain

M Alizadeh, K Andersson, O Schelen - Journal of Internet Services …, 2020 - diva-portal.org
Distributed ledgers and blockchain technologies can improve system security and
trustworthiness by providing immutable replicated histories of data. Blockchain is a linked list …

Optimal sybil-resilient node admission control

N Tran, J Li, L Subramanian… - 2011 Proceedings IEEE …, 2011 - ieeexplore.ieee.org
Most existing large-scale networked systems on the Internet such as peer-to-peer systems
are vulnerable to Sybil attacks where a single adversary can introduce many bogus …