Abstract
Peer-to-peer systems are known to be vulnerable to the Sybil attack. The lack of a central authority allows a malicious user to create many fake identities (called Sybil nodes) pretending to be independent honest nodes. The goal of the malicious user is to influence the system on his/her behalf. In order to detect the Sybil nodes and prevent the attack, we use here a reputation system for every node, built through observing its interactions with its peers. The construction makes every node a part of a distributed authority that keeps records on the reputation and behavior of the nodes. Records of interactions between nodes are broadcast by the interacting nodes and honest reporting proves to be a Nash Equilibrium for correct (non-Sybil) nodes. We argue that in realistic communication schedule scenarios, simple graph-theoretic queries help in exposing those nodes most likely to be Sybil.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aspnes, J., Jackson, C., Krishnamurthy, A.: Exposing computationally-challenged Byzantine impostors. Technical Report YALEU/DCS/TR-1332, Yale University Department of Computer Science (July 2005)
Bazzi, R.A., Konjevod, G.: On the establishment of distinct identities in overlay networks. Distributed Computing 19(4), 267–287 (2007)
Buragohain, C., Agrawal, D., Suri, S.: A game theoretic framework for incentives in p2p systems. In: Proceedings. Third International Conference on Peer-to-Peer Computing P2P 2003, pp. 48–56 (September 2003)
Čapkun, S., Hubaux, J.-P.: Secure positioning of wireless devices with applications to sensor networks. In: Proceedings of INFOCOM (2005)
Čapkun, S., Hubaux, J.P.: Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications 24(2), 221–232 (2006)
Charikar, M.: Greedy approximation algorithms for finding dense components in a graph. In: Jansen, K., Khuller, S. (eds.) APPROX 2000. LNCS, vol. 1913, pp. 84–95. Springer, Heidelberg (2000)
Cooke, R.M.: Experts in Uncertainty: Opinion and Subjective Probability in Science (Environmental Ethics and Science Policy). Oxford University Press, Oxford (October 1991)
Douceur, J.R.: The sybil attack. In: IPTPS, pp. 251–260. Springer, London (2002)
Lesniewski-Laas, C.: A sybil-proof one-hop dht. In: SocialNets 2008: Proceedings of the 1st Workshop on Social Network Systems, pp. 19–24. ACM, New York (2008)
Miller, N., Resnick, P., Zeckhauser, R.: Eliciting informative feedback: The peer-prediction method. Manage. Sci. 51(9), 1359–1373 (2005)
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis and defenses. In: Proc. of IPSN (2004)
Piro, C., Shields, C., Levine, B.N.: Detecting the sybil attack in mobile ad hoc networks. In: Securecomm and Workshops, September 1-28, pp. 1–11 (2006)
Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proc. of ACM WiSe (2003)
Tarjan, R.E.: Depth-first search and linear graph algorithms. SIAM J. Comput. 1(2), 146–160 (1972)
Waters, B.R., Felten, E.W.: Secure, private proofs of location. Technical Report TR-667-03, Princeton (2003)
Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: A near-optimal social network defense against sybil attacks. In: IEEE Symposium on Security and Privacy (Oakland 2008) (2008)
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: SIGCOMM, pp. 267–278 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cárdenas-Haro, J.A., Konjevod, G. (2010). Detecting Sybil Nodes in Static and Dynamic Networks. In: Meersman, R., Dillon, T., Herrero, P. (eds) On the Move to Meaningful Internet Systems, OTM 2010. OTM 2010. Lecture Notes in Computer Science, vol 6427. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16949-6_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-16949-6_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16948-9
Online ISBN: 978-3-642-16949-6
eBook Packages: Computer ScienceComputer Science (R0)