Peer-to-peer systems are known to be vulnerable to the Sybil attack. The lack of a central authority allows a malicious user to create many fake identities (called Sybil nodes) pretending to be independent honest nodes. The goal of the malicious user is to influence the system on his/her behalf. In order to detect the Sybil nodes and prevent the attack, a reputation system is used for the nodes, built through observing its interactions with its peers. The construction makes every node a part of a distributed authority that keeps records on the reputation and behavior of the nodes.
Download count: 0
- Partial requirement for: Ph.D., Arizona State University, 2010Note typethesis
- Includes bibliographical references (p. 64-65)Note typebibliography
- Field of study: Computer science