Call for Paper - March 2020 Edition
IJCA solicits original research papers for the March 2020 Edition. Last date of manuscript submission is February 20, 2020. Read More

A Survey and Analysis of Sybil Attack in Peer to Peer Network

Print
PDF
IJCA Proceedings on National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)
© 2015 by IJCA Journal
NCKITE 2015 - Number 2
Year of Publication: 2015
Authors:
Samidha Nagdeve
Aksah Wanjari

Samidha Nagdeve and Aksah Wanjari. Article: A Survey and Analysis of Sybil Attack in Peer to Peer Network. IJCA Proceedings on National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015) NCKITE 2015(2):46-48, July 2015. Full text available. BibTeX

@article{key:article,
	author = {Samidha Nagdeve and Aksah Wanjari},
	title = {Article: A Survey and Analysis of Sybil Attack in Peer to Peer Network},
	journal = {IJCA Proceedings on National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)},
	year = {2015},
	volume = {NCKITE 2015},
	number = {2},
	pages = {46-48},
	month = {July},
	note = {Full text available}
}

Abstract

There Peer-to-peer(P2P) networks is that they are continually subject to Sybil attacks malicious nods can compromise the network by creating and directing large numbers of fictitious identities. In this paper, Sybil attacks may underscore the successfully of such schemes as malicious peers may use fake identities to synthetically manipulate the reputation. The levels of trust of several authentic and honest peers. Inthis mostly trusted certification, Reversing testing, Random key redistribution, Location/position verification and Reputation mechanisms methodology use. We analysis of the Sybil attack with respect to the resource chuck to operate Sybilnodes and we consider the calculableeffect of Sybil nodeson the total system. Reputation systems analyze reputation keep count according to its history of logs file.

References

  • B. S. Jyothi and D. Janakiram, "SyMonA practical approach to defend large structured P2P systems against Sybil attack," Peer- to- Peer Network. Appl. , vol. 4, pp. 289–308, 2011.
  • J. Saia, A. Fiat, S. Gribble, A. R. Karlin, and S. Saroiu" Dynamicallyfault-tolerant content addressable networks" Proceedings of the 1st International Workshop on Peer-to-Peer Systems, 2002.
  • Xu Xiang," Defeating against sybil-attacks in peer-to-peer networks", International Parallel andDistributed Processing Symposium Workshops 2012 IEEE.
  • HosamRowaihy, William Enck, Patrick McDaniel, and Thomas La" Limiting Sybil Attacks in Structured P2P Networks",IEEE 2013
  • Lin Cai and Roberto Rojas-Cessa," Containing Sybil Attacks on Trust Management Schemes for Peer-to-Peer Networks", IEEE ICC 2014 - Communication and Information Systems Security Symposium.
  • G. Theodorakopoulos and J. S. Baras, "On trust models and trust evaluation metrics for ad hoc networks," Selected Areas in Communications, IEEE Journal on, vol. 24, no. 2, pp. 318–328, 2006.
  • Rakesh G. V 1, ShantaRangaswamy 2, Vinay Hegde 3, Shoba G 4, "A Survey of Techniques to Defend Against"
  • "Sybil Attacks in Social Networks", International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 5, May 2014
  • N. Tran, J. Li, L. Subramanian, and S. S. M. Chow. "Optimal Sybil resilient node admission control", In IEEE INFOCOM, 2011.
  • J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in sensor networks: analysis & defenses," in Proc. of ACM IPSN, 2004 pp. 259–268.
  • J. Ledlie and M. Seltzer, "Distributed, secure load balancing with skew, heterogeneity and churn," in Proc. of IEEE INFOCOM, vol. 2, 2005, pp. 1419–1430.
  • Y. Reddy, "A game theory approach to detect malicious nodes in wireless sensor networks," in Proc. of IEEE SENSORCOMM, 2009, pp. 462–468.
  • Wei Wei?, Fengyuan Xu?, Chiu C. Tan†, Qun Li "Sybil Defender: Defend Against Sybil Attacks in Large Social Networks ", the College of William and Mary, †Temple University 2013.
  • Nitin Kumar Sain, Vikas Kumar Sihag," A Reactive Approach for Detection of Collusion Attacks in P2P Trust and Reputation Systems", International Advance Computing Conference (IACC) IEEE 2014.
  • Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky," Sybil Limit: A Near-Optimal Social Network Defense against Sybil Attacks", USENIX NSDI, 2008.
  • James Newsome, Elaine Shi, Dawn Song, "The Sybil Attack in Sensor Networks: Analysis & Defenses", IPSN'04, April 26–27, 2004, Berkeley, California, USA.
  • Chris Lesniewski-Laas," A Sybil-proof one-hop DHT", SocialNets'08, April 1, 2008, Glasgow, Scotland, UK.
  • James Newsome, Elaine Shi, Dawn Song,"The Sybil Attack in Sensor Networks: Analysis & Defenses",IPSN'04,April 26–27, 2004, Berkeley, California,USA.