Advertisement

Detecting Sybil Nodes in Static and Dynamic Networks

  • José Antonio Cárdenas-Haro
  • Goran Konjevod
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6427)

Abstract

Peer-to-peer systems are known to be vulnerable to the Sybil attack. The lack of a central authority allows a malicious user to create many fake identities (called Sybil nodes) pretending to be independent honest nodes. The goal of the malicious user is to influence the system on his/her behalf. In order to detect the Sybil nodes and prevent the attack, we use here a reputation system for every node, built through observing its interactions with its peers. The construction makes every node a part of a distributed authority that keeps records on the reputation and behavior of the nodes. Records of interactions between nodes are broadcast by the interacting nodes and honest reporting proves to be a Nash Equilibrium for correct (non-Sybil) nodes. We argue that in realistic communication schedule scenarios, simple graph-theoretic queries help in exposing those nodes most likely to be Sybil.

Keywords

Distributed Systems Sybil attack Network security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aspnes, J., Jackson, C., Krishnamurthy, A.: Exposing computationally-challenged Byzantine impostors. Technical Report YALEU/DCS/TR-1332, Yale University Department of Computer Science (July 2005)Google Scholar
  2. 2.
    Bazzi, R.A., Konjevod, G.: On the establishment of distinct identities in overlay networks. Distributed Computing 19(4), 267–287 (2007)CrossRefzbMATHGoogle Scholar
  3. 3.
    Buragohain, C., Agrawal, D., Suri, S.: A game theoretic framework for incentives in p2p systems. In: Proceedings. Third International Conference on Peer-to-Peer Computing P2P 2003, pp. 48–56 (September 2003)Google Scholar
  4. 4.
    Čapkun, S., Hubaux, J.-P.: Secure positioning of wireless devices with applications to sensor networks. In: Proceedings of INFOCOM (2005)Google Scholar
  5. 5.
    Čapkun, S., Hubaux, J.P.: Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications 24(2), 221–232 (2006)CrossRefGoogle Scholar
  6. 6.
    Charikar, M.: Greedy approximation algorithms for finding dense components in a graph. In: Jansen, K., Khuller, S. (eds.) APPROX 2000. LNCS, vol. 1913, pp. 84–95. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  7. 7.
    Cooke, R.M.: Experts in Uncertainty: Opinion and Subjective Probability in Science (Environmental Ethics and Science Policy). Oxford University Press, Oxford (October 1991)Google Scholar
  8. 8.
    Douceur, J.R.: The sybil attack. In: IPTPS, pp. 251–260. Springer, London (2002)Google Scholar
  9. 9.
    Lesniewski-Laas, C.: A sybil-proof one-hop dht. In: SocialNets 2008: Proceedings of the 1st Workshop on Social Network Systems, pp. 19–24. ACM, New York (2008)Google Scholar
  10. 10.
    Miller, N., Resnick, P., Zeckhauser, R.: Eliciting informative feedback: The peer-prediction method. Manage. Sci. 51(9), 1359–1373 (2005)CrossRefGoogle Scholar
  11. 11.
    Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis and defenses. In: Proc. of IPSN (2004)Google Scholar
  12. 12.
    Piro, C., Shields, C., Levine, B.N.: Detecting the sybil attack in mobile ad hoc networks. In: Securecomm and Workshops, September 1-28, pp. 1–11 (2006)Google Scholar
  13. 13.
    Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proc. of ACM WiSe (2003)Google Scholar
  14. 14.
    Tarjan, R.E.: Depth-first search and linear graph algorithms. SIAM J. Comput. 1(2), 146–160 (1972)MathSciNetCrossRefzbMATHGoogle Scholar
  15. 15.
    Waters, B.R., Felten, E.W.: Secure, private proofs of location. Technical Report TR-667-03, Princeton (2003)Google Scholar
  16. 16.
    Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: A near-optimal social network defense against sybil attacks. In: IEEE Symposium on Security and Privacy (Oakland 2008) (2008)Google Scholar
  17. 17.
    Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: SIGCOMM, pp. 267–278 (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • José Antonio Cárdenas-Haro
    • 1
  • Goran Konjevod
    • 1
  1. 1.School of Computing, Informatics and Decision Systems EngineeringArizona State UniversityTempe

Personalised recommendations