Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Prevention of Sybil Attack using a Credential System in Anonymizing Networks


Affiliations
1 Department of Computer Science, Prathyusha Institute of Technology and Management, Thiruvallur, India
2 Department of Computer Science, Prathyusha Institute of Technology and Management, Thiruvallur, India
     

   Subscribe/Renew Journal


Users are allowed to access the anonymity network while they are blocked from tracing their identity on the internet. Tor is open-source anonymity software free to public use. Online anonymity moves Internet traffic through a network of servers. Traffic analysis and network surveillance are prevented by the networks which are anonymized or at least makes it more difficult. Website administrators can disable access to abuser by blocking their IP addresses. But when an abuser routes through an anonymizing network it is not practical to block the IP address. So, all the known exit nodes of anonymizing networks have been blocked by the administrators. As a result, anonymous access has been denied to both misbehaving and behaving users alike. A privacy maintaining system called Nymble has been developed to blacklist the misbehaving users and the security of the system is improved.


Keywords

Anonymous Blacklisting, Privacy, Rate-Limited, Revocation.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 159

PDF Views: 3




  • Prevention of Sybil Attack using a Credential System in Anonymizing Networks

Abstract Views: 159  |  PDF Views: 3

Authors

S. D. Chandhana
Department of Computer Science, Prathyusha Institute of Technology and Management, Thiruvallur, India
E. A. Mary Anita
Department of Computer Science, Prathyusha Institute of Technology and Management, Thiruvallur, India

Abstract


Users are allowed to access the anonymity network while they are blocked from tracing their identity on the internet. Tor is open-source anonymity software free to public use. Online anonymity moves Internet traffic through a network of servers. Traffic analysis and network surveillance are prevented by the networks which are anonymized or at least makes it more difficult. Website administrators can disable access to abuser by blocking their IP addresses. But when an abuser routes through an anonymizing network it is not practical to block the IP address. So, all the known exit nodes of anonymizing networks have been blocked by the administrators. As a result, anonymous access has been denied to both misbehaving and behaving users alike. A privacy maintaining system called Nymble has been developed to blacklist the misbehaving users and the security of the system is improved.


Keywords


Anonymous Blacklisting, Privacy, Rate-Limited, Revocation.