ABSTRACT
We present Gatekeeper, a decentralized protocol that performs Sybil-resilient node admission control based on a social network. Gatekeeper can admit most honest nodes while limiting the number of Sybils admitted per attack edge to O(log k), where k is the number of attack edges. Our result improves over SybilLimit [3] by a factor of log n in the face of O(1) attack edges. Even when the number of attack edges reaches O(n/ log n), Gatekeeper only admits O(log n) Sybils per attack edge, similar to that achieved by SybilLimit.
- N. Tran, J. Li, L. Subramanian, and S. Chow. Optimal Sybil-resilient node admission control. Technical report, http://www.news.cs.nyu.edu/~trandinh/GateKeeper_TR.pdf.Google Scholar
- N. Tran, B. Min, J. Li, L. Subramanian. Sybil-resilient online content voting. In NSDI, 2009. Google ScholarDigital Library
- H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A near-optimal social network defense against Sybil attacks. In IEEE Symposium on Security and Privacy, 2008. Google ScholarDigital Library
- H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman. SybilGuard: defending against Sybil attacks via social networks. In SIGCOMM, 2006. Google ScholarDigital Library
Index Terms
- Brief announcement: improving social-network-based sybil-resilient node admission control
Recommendations
SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks
Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of the system. This paper presents SybilDefender, a sybil defense mechanism that ...
Brief Announcement: An Exponential Separation Between Randomized and Deterministic Complexity in the LOCAL Model
PODC '16: Proceedings of the 2016 ACM Symposium on Principles of Distributed ComputingOver the past 30 years numerous algorithms have been designed for symmetry breaking problems in the LOCAL model, such as maximal matching, MIS, vertex coloring, and edge-coloring. For most problems the best randomized algorithm is at least exponentially ...
Stalk and lie-The cost of Sybil attacks in opportunistic networks
Opportunistic Networks are envisioned to complement infrastructure-based communication in overloaded cellular settings, in remote areas, or during and immediately after large scale disasters. On account of their highly distributed and dynamic nature, as ...
Comments