Open Access Open Access  Restricted Access Subscription Access

A Review of Techniques to Mitigate Sybil Attacks


Affiliations
1 Department of Computer Science and Information Systems, BITS, Pilani, India
2 School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai, India
 

Any decentralised distributed network is particularly vulnerable to the Sybil attack wherein a malicious node masquerades as several different nodes, called Sybil nodes, simultaneously in an attempt to disrupt the proper functioning of the network. Such attacks may cause damage on a fairly large scale especially since they are difficult to detect and there has been no universally accepted scheme to counter them as yet. In this paper, we discuss the different kinds of Sybil attacks including those occurring in peer-to-peer reputation systems, selforganising networks and even social network systems. In addition, various methods that have been suggested over time to decrease or eliminate their risk completely are also analysed along with their modus operandi.

Keywords

MANET, Security, Sybil Attack, Defence.
User
Notifications
Font Size

Abstract Views: 200

PDF Views: 2




  • A Review of Techniques to Mitigate Sybil Attacks

Abstract Views: 200  |  PDF Views: 2

Authors

Nitish Balachandran
Department of Computer Science and Information Systems, BITS, Pilani, India
Sugata Sanyal
School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai, India

Abstract


Any decentralised distributed network is particularly vulnerable to the Sybil attack wherein a malicious node masquerades as several different nodes, called Sybil nodes, simultaneously in an attempt to disrupt the proper functioning of the network. Such attacks may cause damage on a fairly large scale especially since they are difficult to detect and there has been no universally accepted scheme to counter them as yet. In this paper, we discuss the different kinds of Sybil attacks including those occurring in peer-to-peer reputation systems, selforganising networks and even social network systems. In addition, various methods that have been suggested over time to decrease or eliminate their risk completely are also analysed along with their modus operandi.

Keywords


MANET, Security, Sybil Attack, Defence.