A survey of DHT security techniques
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable
attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been …
attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been …
Systematizing decentralization and privacy: Lessons from 15 years of research and deployments
Decentralized systems are a subset of distributed systems where multiple authorities control
different components and no authority is fully trusted by all. This implies that any component …
different components and no authority is fully trusted by all. This implies that any component …
Sybillimit: A near-optimal social network defense against sybil attacks
H Yu, PB Gibbons, M Kaminsky… - 2008 IEEE Symposium …, 2008 - ieeexplore.ieee.org
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable
to sybil attacks, where a malicious user pretends to have multiple identities (called sybil …
to sybil attacks, where a malicious user pretends to have multiple identities (called sybil …
Sybilguard: defending against sybil attacks via social networks
H Yu, M Kaminsky, PB Gibbons… - Proceedings of the 2006 …, 2006 - dl.acm.org
Peer-to-peer and other decentralized, distributed systems are known to be particularly
vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities …
vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities …
[PDF][PDF] Sybilinfer: Detecting sybil nodes using social networks.
SybilInfer is an algorithm for labelling nodes in a social network as honest users or Sybils
controlled by an adversary. At the heart of SybilInfer lies a probabilistic model of honest …
controlled by an adversary. At the heart of SybilInfer lies a probabilistic model of honest …
[PDF][PDF] Sybil-Resilient Online Content Voting.
Obtaining user opinion (using votes) is essential to ranking user-generated online content.
However, any content voting system is susceptible to the Sybil attack where adversaries can …
However, any content voting system is susceptible to the Sybil attack where adversaries can …
Sybilguard: defending against sybil attacks via social networks
H Yu, M Kaminsky, PB Gibbons… - IEEE/ACM Transactions …, 2008 - ieeexplore.ieee.org
Peer-to-peer and other decentralized, distributed systems are known to be particularly
vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities …
vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities …
[PDF][PDF] A survey of solutions to the sybil attack
Many security mechanisms are based on specific assumptions of identity and are vulnerable
to attacks when these assumptions are violated. For example, impersonation is the well …
to attacks when these assumptions are violated. For example, impersonation is the well …
A survey of secure internet of things in relation to blockchain
M Alizadeh, K Andersson, O Schelen - Journal of Internet Services …, 2020 - diva-portal.org
Distributed ledgers and blockchain technologies can improve system security and
trustworthiness by providing immutable replicated histories of data. Blockchain is a linked list …
trustworthiness by providing immutable replicated histories of data. Blockchain is a linked list …
Optimal sybil-resilient node admission control
Most existing large-scale networked systems on the Internet such as peer-to-peer systems
are vulnerable to Sybil attacks where a single adversary can introduce many bogus …
are vulnerable to Sybil attacks where a single adversary can introduce many bogus …