TY - GEN
T1 - Safeguarding against Sybil attacks via social networks and multipath routing
AU - Hota, Chittaranjan
AU - Lindqvist, Janne
AU - Karvonen, Kristiina
AU - Ylä-Jääski, Antti
AU - Mohan, C. K.J.
PY - 2007
Y1 - 2007
N2 - Peer-to-Peer (P2P) overlay networks are currently being used to build large scale distributed systems running various decentralized applications like distributed storage, content distribution, collaborative scheduling, and leader election. Although we have protocols like Byzantine agreement, voting schemes etc. for building resilient distributed applications; we have very few solutions available for safeguarding these distributed protocols from Sybil attacks. In a Sybil attack, an adversary can forge multiple identities and create multiple, distinct nodes in the system hence overthrowing any upper bound on number of malicious nodes in these protocols. In this paper, we present a multipath routing protocol using graph theoretic approach to group the Sybil nodes first and then to poll them using Host Identity Protocol (HIP) to decide upon whether they really belong to a Sybil group. HIP clearly separates participating users from overlay nodes. It overcomes P2P network challenges like stability over time and identity differentiation. We also use a social network where the attack edges are minimum. An attack edge between a malicious user and an honest user indicates that the malicious user is able to establish a trust relationship with the honest user by some means. We perform simulations to show the feasibility of our distributed protocol.
AB - Peer-to-Peer (P2P) overlay networks are currently being used to build large scale distributed systems running various decentralized applications like distributed storage, content distribution, collaborative scheduling, and leader election. Although we have protocols like Byzantine agreement, voting schemes etc. for building resilient distributed applications; we have very few solutions available for safeguarding these distributed protocols from Sybil attacks. In a Sybil attack, an adversary can forge multiple identities and create multiple, distinct nodes in the system hence overthrowing any upper bound on number of malicious nodes in these protocols. In this paper, we present a multipath routing protocol using graph theoretic approach to group the Sybil nodes first and then to poll them using Host Identity Protocol (HIP) to decide upon whether they really belong to a Sybil group. HIP clearly separates participating users from overlay nodes. It overcomes P2P network challenges like stability over time and identity differentiation. We also use a social network where the attack edges are minimum. An attack edge between a malicious user and an honest user indicates that the malicious user is able to establish a trust relationship with the honest user by some means. We perform simulations to show the feasibility of our distributed protocol.
UR - http://www.scopus.com/inward/record.url?scp=47749134864&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=47749134864&partnerID=8YFLogxK
U2 - 10.1109/NAS.2007.47
DO - 10.1109/NAS.2007.47
M3 - Conference contribution
AN - SCOPUS:47749134864
SN - 0769529275
SN - 9780769529271
T3 - International Conference on Networking, Architecture, and Storage, NAS 2007
SP - 122
EP - 129
BT - International Conference on Networking, Architecture, and Storage, NAS 2007
T2 - 2nd International Conference on Networking, Architecture, and Storage, NAS 2007
Y2 - 29 July 2007 through 31 July 2007
ER -