Containing sybil attacks on trust management schemes for peer-to-peer networks

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

In this paper, we introduce a framework to detect possible sybil attacks against a trust management scheme of peer-to-peer (P2P) networks used for limiting the proliferation of malware. Sybil attacks may underscore the effectivity of such schemes as malicious peers may use bogus identities to artificially manipulate the reputation, and therefore, the levels of trust of several legitimate and honest peers. The framework includes a k-means clustering scheme, a method to verify the transactions reported by peers, and identification of possible collaborations between peers. We prove that as the amount of public information on peers increases, the effectivity of sybil attacks may decrease. We study the performance of each of these mechanisms, in terms of the number of infected peers in a P2P network, using computer simulation. We show the effect of each mechanism and their combinations. We show that the combination of these schemes is effective and efficient.

Original languageEnglish (US)
Title of host publication2014 IEEE International Conference on Communications, ICC 2014
PublisherIEEE Computer Society
Pages841-846
Number of pages6
ISBN (Print)9781479920037
DOIs
StatePublished - 2014
Event2014 1st IEEE International Conference on Communications, ICC 2014 - Sydney, NSW, Australia
Duration: Jun 10 2014Jun 14 2014

Publication series

Name2014 IEEE International Conference on Communications, ICC 2014

Other

Other2014 1st IEEE International Conference on Communications, ICC 2014
Country/TerritoryAustralia
CitySydney, NSW
Period6/10/146/14/14

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Keywords

  • Distributed system
  • key mean clustering
  • malware proliferation
  • p2p network
  • sybil attack
  • transaction verification

Fingerprint

Dive into the research topics of 'Containing sybil attacks on trust management schemes for peer-to-peer networks'. Together they form a unique fingerprint.

Cite this