Skip to main content

A Game-Based Approach for Mitigating the Sybil Attacks on Blockchain Applications

  • Conference paper
  • First Online:
Computer Information Systems and Industrial Management (CISIM 2023)

Abstract

The data explosion of this digital century encourages the necessity of data security and maintaining privacy. The generated data through online transactions in different sectors have been increased a million times. Therefore, the trustful transaction and reliability of data became necessary for its analysis and future use in the online platform. The change of data platform from a centralized to distributed nature enhances the utility of the data use, and the security threats are also increased side by side. The Sybil attack is one of the significant security threats in the distributed network environment. Blockchain is a peer-to-peer distributed ledger that works in a distributed environment. However, the blockchain framework, which aims to provide tamper-proof security on data suffers from Sybil attacks too. This paper aims to analyze the implementation of blockchain technology in different applications and propose a new game-based model to effectively detect and mitigate Sybil attacks on the blockchain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Arifeen, M.M., Al Mamun, A., Ahmed, T., Kaiser, M.S., Mahmud, M.: A blockchain-based scheme for sybil attack detection in underwater wireless sensor networks. Adv. Intell. Syst. Comput. 1309, 467–476 (2021)

    Article  Google Scholar 

  2. Bochem, A., Leiding, B.: Rechained: Sybil-resistant distributed identities for the internet of things and mobile ad hoc networks. Sensors 21(9), 1–27 (2021)

    Article  Google Scholar 

  3. Platt, M., McBurney, P.: Sybil attacks on identity-augmented proof-of-stake. Comput. Netw. 199, 108424 (2021)

    Article  Google Scholar 

  4. Rajab, T., Manshaei, M.H., Dakhilalian, M., Jadliwala, M., Rahman, M.A.: On the feasibility of sybil attacks in shard-based permission less blockchains (2020)

    Google Scholar 

  5. Wadii, J., Rim, H., Ridha, B.: Detecting and preventing Sybil attacks in wireless sensor networks. In: Mediterranean Microwave Symposium, vol. 2019, October 2019

    Google Scholar 

  6. Pecori, R., Veltri, L.: A balanced trust-based method to counter sybil and spartacus attacks in chord. Secur. Commun. Netwo. 2018, 1–16 (2018)

    Article  Google Scholar 

  7. Swathi, P., Modi, C., Patel, D.: Preventing sybil attack in blockchain using distributed behavior monitoring of miners. In: 2019 10th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2019, pp. 1–6 (2019)

    Google Scholar 

  8. Begum, A., Tareq, A.H., Sultana, M., Sohel, M.K., Rahman, T., Sarwar, A.H.: Blockchain attacks, analysis and a model to solve double spending attack. Int. J. Mach. Learn. Comput. 10(2), 352–357 (2020)

    Google Scholar 

  9. Kumar, B., Bhuyan, B.: Game theoretical defense mechanism against reputation based sybil attacks. Procedia Comput. Sci. 167(2019), 2465–2477 (2020). https://doi.org/10.1016/j.procs.2020.03.299

    Article  Google Scholar 

  10. Shareh, M.B., Navidi, H., Javadi, H.H.S., HosseinZadeh, M.: Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model. Inf. Sci. 470, 94–108 (2019). https://doi.org/10.1016/j.ins.2018.08.054

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Ashis Kumar Samanta or Nabendu Chaki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Samanta, A.K., Chaki, N. (2023). A Game-Based Approach for Mitigating the Sybil Attacks on Blockchain Applications. In: Saeed, K., Dvorský, J., Nishiuchi, N., Fukumoto, M. (eds) Computer Information Systems and Industrial Management. CISIM 2023. Lecture Notes in Computer Science, vol 14164. Springer, Cham. https://doi.org/10.1007/978-3-031-42823-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-42823-4_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-42822-7

  • Online ISBN: 978-3-031-42823-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics