Abstract
The data explosion of this digital century encourages the necessity of data security and maintaining privacy. The generated data through online transactions in different sectors have been increased a million times. Therefore, the trustful transaction and reliability of data became necessary for its analysis and future use in the online platform. The change of data platform from a centralized to distributed nature enhances the utility of the data use, and the security threats are also increased side by side. The Sybil attack is one of the significant security threats in the distributed network environment. Blockchain is a peer-to-peer distributed ledger that works in a distributed environment. However, the blockchain framework, which aims to provide tamper-proof security on data suffers from Sybil attacks too. This paper aims to analyze the implementation of blockchain technology in different applications and propose a new game-based model to effectively detect and mitigate Sybil attacks on the blockchain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Arifeen, M.M., Al Mamun, A., Ahmed, T., Kaiser, M.S., Mahmud, M.: A blockchain-based scheme for sybil attack detection in underwater wireless sensor networks. Adv. Intell. Syst. Comput. 1309, 467–476 (2021)
Bochem, A., Leiding, B.: Rechained: Sybil-resistant distributed identities for the internet of things and mobile ad hoc networks. Sensors 21(9), 1–27 (2021)
Platt, M., McBurney, P.: Sybil attacks on identity-augmented proof-of-stake. Comput. Netw. 199, 108424 (2021)
Rajab, T., Manshaei, M.H., Dakhilalian, M., Jadliwala, M., Rahman, M.A.: On the feasibility of sybil attacks in shard-based permission less blockchains (2020)
Wadii, J., Rim, H., Ridha, B.: Detecting and preventing Sybil attacks in wireless sensor networks. In: Mediterranean Microwave Symposium, vol. 2019, October 2019
Pecori, R., Veltri, L.: A balanced trust-based method to counter sybil and spartacus attacks in chord. Secur. Commun. Netwo. 2018, 1–16 (2018)
Swathi, P., Modi, C., Patel, D.: Preventing sybil attack in blockchain using distributed behavior monitoring of miners. In: 2019 10th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2019, pp. 1–6 (2019)
Begum, A., Tareq, A.H., Sultana, M., Sohel, M.K., Rahman, T., Sarwar, A.H.: Blockchain attacks, analysis and a model to solve double spending attack. Int. J. Mach. Learn. Comput. 10(2), 352–357 (2020)
Kumar, B., Bhuyan, B.: Game theoretical defense mechanism against reputation based sybil attacks. Procedia Comput. Sci. 167(2019), 2465–2477 (2020). https://doi.org/10.1016/j.procs.2020.03.299
Shareh, M.B., Navidi, H., Javadi, H.H.S., HosseinZadeh, M.: Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model. Inf. Sci. 470, 94–108 (2019). https://doi.org/10.1016/j.ins.2018.08.054
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Samanta, A.K., Chaki, N. (2023). A Game-Based Approach for Mitigating the Sybil Attacks on Blockchain Applications. In: Saeed, K., Dvorský, J., Nishiuchi, N., Fukumoto, M. (eds) Computer Information Systems and Industrial Management. CISIM 2023. Lecture Notes in Computer Science, vol 14164. Springer, Cham. https://doi.org/10.1007/978-3-031-42823-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-031-42823-4_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-42822-7
Online ISBN: 978-3-031-42823-4
eBook Packages: Computer ScienceComputer Science (R0)