{"title":"与分布式认证相耦合的抗SybilGuard许可控制","authors":"François Lesueur, L. Mé, Valérie Viet Triem Tong","doi":"10.1109/WETICE.2008.7","DOIUrl":null,"url":null,"abstract":"Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person creates many node identifiers and possibly chooses some of them in order to disrupt availability or integrity in the P2P network. In this paper, we propose a sybil-resistant distributed admission control system which combines SybilGuard with distributed certification. A new node can join the network if, using SybilGuard, a fixed ratio of the nodes think this new node is genuine and so participate in its distributed certification. This fully distributed system tackles each described aspect of the sybil attack, preventing users from creating many identifiers and enforcing the use of truly random identifiers.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification\",\"authors\":\"François Lesueur, L. Mé, Valérie Viet Triem Tong\",\"doi\":\"10.1109/WETICE.2008.7\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person creates many node identifiers and possibly chooses some of them in order to disrupt availability or integrity in the P2P network. In this paper, we propose a sybil-resistant distributed admission control system which combines SybilGuard with distributed certification. A new node can join the network if, using SybilGuard, a fixed ratio of the nodes think this new node is genuine and so participate in its distributed certification. This fully distributed system tackles each described aspect of the sybil attack, preventing users from creating many identifiers and enforcing the use of truly random identifiers.\",\"PeriodicalId\":259447,\"journal\":{\"name\":\"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-06-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WETICE.2008.7\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WETICE.2008.7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person creates many node identifiers and possibly chooses some of them in order to disrupt availability or integrity in the P2P network. In this paper, we propose a sybil-resistant distributed admission control system which combines SybilGuard with distributed certification. A new node can join the network if, using SybilGuard, a fixed ratio of the nodes think this new node is genuine and so participate in its distributed certification. This fully distributed system tackles each described aspect of the sybil attack, preventing users from creating many identifiers and enforcing the use of truly random identifiers.