SRJE: Decentralized Authentication Scheme against Sybil Attacks

被引:0
|
作者
Mashimo, Yo [1 ]
Yasutomi, Masanori [1 ]
Shigeno, Hiroshi [1 ]
机构
[1] Keio Univ, Fac Sci & Technol, Yokohama, Kanagawa 223, Japan
来源
2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS | 2009年
关键词
P2P; DHT; security; sybil attack;
D O I
10.1109/NBiS.2009.54
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In P2P networks, there are attacks known as Sybil attacks, where malicious users attempt to gain control over the network by using multiple nodes. To inhibit Sybil attacks, it is effective to set limits on the number of nodes per user. A decentralized authentication method, referred to as self-registration, in which the rule of majority is used to set a limit on the number of nodes in DHT (Distributed Hash Table) networks, has been proposed. However, self-registration is not effective against increasing the number of malicious users. In this paper, we propose a more reliable method by applying a local trust mechanism (SRJE, Self-Registration with Judgement Evaluation), which uses an original surveillance mechanism for self-registration. We show the effectiveness of SRJE by performing simulations comparing SRJE with self-registration.
引用
收藏
页码:220 / 225
页数:6
相关论文
共 50 条
  • [1] A Regional Statistics Detection Scheme against Sybil Attacks in WSNs
    Li, Mingxi
    Xiong, Yan
    Wu, Xuangou
    Zhou, Xianchun
    Sun, Yuhui
    Chen, Shenpei
    Zhu, Xiaoya
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 285 - 291
  • [2] Defense against Sybil attacks and authentication for anonymous location-based routing in MANET
    Kumari, S. Vadhana
    Paramasivan, B.
    WIRELESS NETWORKS, 2017, 23 (03) : 715 - 726
  • [3] Adaptive link fingerprint authentication scheme against Sybil attack in ZigBee network
    Yu B.
    Huang M.
    Huang Y.
    Kong Z.
    Huang, Meigen (huang_meigen@163.com), 2016, Science Press (38): : 2627 - 2632
  • [4] Distributed Key Management Scheme against Sybil Attacks of Wireless Sensor Network
    Xu Junfeng
    Wang Yongjian
    CHINA COMMUNICATIONS, 2012, 9 (05) : 55 - 63
  • [5] Effective Authentication to Prevent Sybil Attacks in Vehicular Platoons
    Junaidi, Danial R.
    Ma, Maode
    Su, Rong
    2022 17TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION (ICARCV), 2022, : 949 - 954
  • [6] Graphical Password Authentication Scheme Against Credential Leakage Attacks
    Chen J.
    Xu C.-X.
    Zhang Y.
    Jiang C.-S.
    Han Y.-X.
    Cao C.-C.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (12): : 5787 - 5806
  • [7] Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless sensor Networks
    Yuan, Yali
    Huo, Liuwei
    Wang, Zhixiao
    Hogrefe, Dieter
    IEEE ACCESS, 2018, 6 : 27629 - 27636
  • [8] Defending against Sybil attacks in sensor networks
    Zhang, QH
    Wang, P
    Reeves, DS
    Ning, P
    25th IEEE International Conference on Distributed Computing Systems Workshops, Proceedings, 2005, : 185 - 191
  • [9] Defending against Sybil Attacks in Vehicular Platoons
    Santhosh, Jesty
    Sankaran, Sriram
    13TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (IEEE ANTS), 2019,
  • [10] A Lightweight authentication scheme for IoT against Rogue Base Station Attacks
    Salim, Mikail Mohammed
    Kang, Jungho
    Pan, Yi
    Park, Jong Hyuk
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2022, 19 (11) : 11735 - 11755