Title :
A Sybil-resilient Contribution Transaction Protocol
Author_Institution :
Coll. of Inf. Eng., China Jiliang Univ., Hangzhou, China
Abstract :
Present indirect contribution transaction protocols are vulnerable to sybil attacks where one or more attackers can forge a large number of fictitious nodes. In this paper, we propose a decentralized sybil-resilient contribution transaction protocol. It allows nodes to obtain service for use from remote nodes, while restricting the amount of service which sybil nodes receive from honest nodes even in the face of a large number of attack edges. We verify this property by running it on random graphs with different lengths of contribution transaction chains.
Keywords :
computer network security; peer-to-peer computing; protocols; P2P networks; Sybil resilient contribution transaction protocol; fictitious nodes; random graphs; remote nodes; sybil attacks; Admission control; Educational institutions; Peer to peer computing; Protocols; Public key; Social network services; Peer-to-Peer; Sybil attack; Transaction;
Conference_Titel :
Computational Intelligence and Security (CIS), 2011 Seventh International Conference on
Conference_Location :
Hainan
Print_ISBN :
978-1-4577-2008-6
DOI :
10.1109/CIS.2011.157