• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

The Sybil Attack (2002)

Cached

  • Download as a PDF

Download Links

  • [www.cs.rice.edu]
  • [www.freehaven.net]
  • [www.comp.nus.edu.sg]
  • [www.research.microsoft.com]
  • [research.microsoft.com]
  • [www.ece.cmu.edu]
  • [www.ssrc.ucsc.edu]
  • [www.cs.cornell.edu]
  • [research.microsoft.com]
  • [www.cs.cornell.edu]
  • [www.cs.cornell.edu]
  • [freehaven.net]
  • [www.cs.uiowa.edu]
  • [www.cs.cornell.edu]
  • [www.cs.cornell.edu]
  • [www.eecs.harvard.edu]
  • [users.ece.cmu.edu]
  • [www.microsoft.com]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by John Douceur , Judith S. Donath
Citations:1511 - 1 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Douceur02thesybil,
    author = {John Douceur and Judith S. Donath},
    title = {The Sybil Attack},
    booktitle = {},
    year = {2002},
    pages = {251--260}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these "Sybil attacks" is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.

Keyphrases

sybil attack    large-scale peer-to-peer system    substantial fraction    hostile remote    unrealistic assumption    resource parity    many system    multiple identity    single faulty entity    trusted agency    security threat   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University