CFP last date
22 April 2024
Reseach Article

Detection of Sybil Attacks in Structured P2P Overlay Network

by Manjari Kaushik, Kamal Kr. Gola, Gulista Khan, Rahul Rathore
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 136 - Number 6
Year of Publication: 2016
Authors: Manjari Kaushik, Kamal Kr. Gola, Gulista Khan, Rahul Rathore
10.5120/ijca2016908466

Manjari Kaushik, Kamal Kr. Gola, Gulista Khan, Rahul Rathore . Detection of Sybil Attacks in Structured P2P Overlay Network. International Journal of Computer Applications. 136, 6 ( February 2016), 18-23. DOI=10.5120/ijca2016908466

@article{ 10.5120/ijca2016908466,
author = { Manjari Kaushik, Kamal Kr. Gola, Gulista Khan, Rahul Rathore },
title = { Detection of Sybil Attacks in Structured P2P Overlay Network },
journal = { International Journal of Computer Applications },
issue_date = { February 2016 },
volume = { 136 },
number = { 6 },
month = { February },
year = { 2016 },
issn = { 0975-8887 },
pages = { 18-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume136/number6/24157-2016908466/ },
doi = { 10.5120/ijca2016908466 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:36:19.862298+05:30
%A Manjari Kaushik
%A Kamal Kr. Gola
%A Gulista Khan
%A Rahul Rathore
%T Detection of Sybil Attacks in Structured P2P Overlay Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 136
%N 6
%P 18-23
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Sybil attack in computer security is an attack where in a reputation system is subverted by forging identities in peer-to-peer networks. The name was suggested in or before 2002 by Brian Zill at Microsoft Research. In a Sybil attack the attacker subverts the reputation system of a peer-to-peer network by creating a large number of pseudonymous identities, using them to gain a disproportionately large influence. A reputation system's vulnerability to a Sybil attack depends on how cheaply identities can be generated, the degree to which the reputation system accepts inputs from entities that do not have a chain of trust linking them to a trusted entity, and whether the reputation system treats all entities identically. Main motto is to secure the Peer to Peer network (P2P) by Sybil attackers. Considering more parameter for labeling a node ‘genuine’ or ‘Sybil’. Our system has two server one is main server and another is trusted server. Trusted server is act as a centralized server so it has the complete list of members with their details. So when the new member is added to the network, trusted server take the identity check test with its database by checking the new member details with the complete database. If it found common parameters then it label that member as Sybil otherwise genuine.

References
  1. Rakesh G.V , Shanta Rangaswamy , Vinay Hegde , Shoba G,” A Survey of Techniques to Defend Against Sybil Attacks in Social Networks”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 5, May 2014 .
  2. R. Amuthavalli, dr. R. S. Bhuvaneswaran,” detection and prevention of sybil attack in wireless sensor network employing random password comparison method”, journal of theoretical and applied information technology 10th september 2014. Vol. 67 no.1.
  3. Roopali Garg , Himika Sharma,” Proposed Lightweight Sybil Attack Detection Technique in MANET”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (An ISO 3297: 2007 Certified Organization) Vol. 3, Issue 5, May 2014 .
  4. Himadri Nath Saha , Dr. Debika Bhattacharyya , Dr. P. K.Banerjee,” Semi-Centralized Multi-Authenticated RSSI Based Solution to Sybil Attack”, International Journal of Computer Science & Emerging Technologies (E-ISSN: 2044-6004) 338 Volume 1, Issue 4, December 2010.
  5. Anuja Motarwar, Prof. Amresh Kumar,” Study on Detection of Sybil Attack in Wireless Sensor Network”, International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 12, December 2013.
  6. A. Muruganandam1 , R. Anitha,” Passive Adhoc Identity for Sybil Attack Detection Using NDD Algorithm”, International Conference on Computing and Intelligence Systems Volume: 04, Special Issue: March 2015.
  7. Rasheed Hussain, Heekuck oh, “On Secure and Privacy Aware Sybil Attack Detection in Vehicular Communication”, In Journal of Wireless Personal Communication, DOI: 10.1007/s11277-014-1659-5.
  8. https://en.wikipedia.org/wiki/Sybil_attack
Index Terms

Computer Science
Information Sciences

Keywords

Sybil Attacks P2P Overlay Network Server Dot Net.