Description

Peer-to-peer systems are known to be vulnerable to the Sybil attack. The lack of a central authority allows a malicious user to create many fake identities (called Sybil nodes) pretending to be independent honest nodes. The goal of the malicious user is to influence the system on his/her behalf.

Reuse Permissions
  • Downloads
    pdf (465.6 KB)

    Download count: 0

    Details

    Contributors
    Date Created
    2010
    Resource Type
  • Text
  • Collections this item is in
    Note
    • Partial requirement for: Ph.D., Arizona State University, 2010
      Note type
      thesis
    • Includes bibliographical references (p. 64-65)
      Note type
      bibliography
    • Field of study: Computer science

    Citation and reuse

    Statement of Responsibility

    José Antonio Cárdenas-Haro

    Machine-readable links