We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Survey and Analysis of Sybil Attack in Peer to Peer Network

Published on July 2015 by Samidha Nagdeve, Aksah Wanjari
National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)
Foundation of Computer Science USA
NCKITE2015 - Number 2
July 2015
Authors: Samidha Nagdeve, Aksah Wanjari
246df88e-9044-4aa3-8a0b-3fb372489557

Samidha Nagdeve, Aksah Wanjari . A Survey and Analysis of Sybil Attack in Peer to Peer Network. National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015). NCKITE2015, 2 (July 2015), 46-48.

@article{
author = { Samidha Nagdeve, Aksah Wanjari },
title = { A Survey and Analysis of Sybil Attack in Peer to Peer Network },
journal = { National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015) },
issue_date = { July 2015 },
volume = { NCKITE2015 },
number = { 2 },
month = { July },
year = { 2015 },
issn = 0975-8887,
pages = { 46-48 },
numpages = 3,
url = { /proceedings/nckite2015/number2/21490-2659/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)
%A Samidha Nagdeve
%A Aksah Wanjari
%T A Survey and Analysis of Sybil Attack in Peer to Peer Network
%J National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)
%@ 0975-8887
%V NCKITE2015
%N 2
%P 46-48
%D 2015
%I International Journal of Computer Applications
Abstract

There Peer-to-peer(P2P) networks is that they are continually subject to Sybil attacks malicious nods can compromise the network by creating and directing large numbers of fictitious identities. In this paper, Sybil attacks may underscore the successfully of such schemes as malicious peers may use fake identities to synthetically manipulate the reputation. The levels of trust of several authentic and honest peers. Inthis mostly trusted certification, Reversing testing, Random key redistribution, Location/position verification and Reputation mechanisms methodology use. We analysis of the Sybil attack with respect to the resource chuck to operate Sybilnodes and we consider the calculableeffect of Sybil nodeson the total system. Reputation systems analyze reputation keep count according to its history of logs file.

References
  1. B. S. Jyothi and D. Janakiram, "SyMonA practical approach to defend large structured P2P systems against Sybil attack," Peer- to- Peer Network. Appl. , vol. 4, pp. 289–308, 2011.
  2. J. Saia, A. Fiat, S. Gribble, A. R. Karlin, and S. Saroiu" Dynamicallyfault-tolerant content addressable networks" Proceedings of the 1st International Workshop on Peer-to-Peer Systems, 2002.
  3. Xu Xiang," Defeating against sybil-attacks in peer-to-peer networks", International Parallel andDistributed Processing Symposium Workshops 2012 IEEE.
  4. HosamRowaihy, William Enck, Patrick McDaniel, and Thomas La" Limiting Sybil Attacks in Structured P2P Networks",IEEE 2013
  5. Lin Cai and Roberto Rojas-Cessa," Containing Sybil Attacks on Trust Management Schemes for Peer-to-Peer Networks", IEEE ICC 2014 - Communication and Information Systems Security Symposium.
  6. G. Theodorakopoulos and J. S. Baras, "On trust models and trust evaluation metrics for ad hoc networks," Selected Areas in Communications, IEEE Journal on, vol. 24, no. 2, pp. 318–328, 2006.
  7. Rakesh G. V 1, ShantaRangaswamy 2, Vinay Hegde 3, Shoba G 4, "A Survey of Techniques to Defend Against"
  8. "Sybil Attacks in Social Networks", International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 5, May 2014
  9. N. Tran, J. Li, L. Subramanian, and S. S. M. Chow. "Optimal Sybil resilient node admission control", In IEEE INFOCOM, 2011.
  10. J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in sensor networks: analysis & defenses," in Proc. of ACM IPSN, 2004 pp. 259–268.
  11. J. Ledlie and M. Seltzer, "Distributed, secure load balancing with skew, heterogeneity and churn," in Proc. of IEEE INFOCOM, vol. 2, 2005, pp. 1419–1430.
  12. Y. Reddy, "A game theory approach to detect malicious nodes in wireless sensor networks," in Proc. of IEEE SENSORCOMM, 2009, pp. 462–468.
  13. Wei Wei?, Fengyuan Xu?, Chiu C. Tan†, Qun Li "Sybil Defender: Defend Against Sybil Attacks in Large Social Networks ", the College of William and Mary, †Temple University 2013.
  14. Nitin Kumar Sain, Vikas Kumar Sihag," A Reactive Approach for Detection of Collusion Attacks in P2P Trust and Reputation Systems", International Advance Computing Conference (IACC) IEEE 2014.
  15. Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky," Sybil Limit: A Near-Optimal Social Network Defense against Sybil Attacks", USENIX NSDI, 2008.
  16. James Newsome, Elaine Shi, Dawn Song, "The Sybil Attack in Sensor Networks: Analysis & Defenses", IPSN'04, April 26–27, 2004, Berkeley, California, USA.
  17. Chris Lesniewski-Laas," A Sybil-proof one-hop DHT", SocialNets'08, April 1, 2008, Glasgow, Scotland, UK.
  18. James Newsome, Elaine Shi, Dawn Song,"The Sybil Attack in Sensor Networks: Analysis & Defenses",IPSN'04,April 26–27, 2004, Berkeley, California,USA.
Index Terms

Computer Science
Information Sciences

Keywords

P2p Sybil Attack Sybil Resilient Trusted Management Free Riding Reputation Mechanism.