• DocumentCode
    255250
  • Title

    Sybil node detection in peer-to-peer networks using indirect validation

  • Author

    Banerjee, C. ; Saxena, S.

  • Author_Institution
    Dept. of Electron. & Commun., Brainware Group of Instn., Barasat, India
  • fYear
    2014
  • fDate
    11-13 Dec. 2014
  • Firstpage
    1
  • Lastpage
    7
  • Abstract
    Peer- to- peer networks are used extensively today. Due to this wide use P2P networks is a target of malicious attacks. The most mentionable of them is the Sybil attack. Existing approaches for detection and mitigation of Sybil nodes are either computationally costly or are dependent on belief models found in social networks. It has been found that these belief models are themselves vulnerable to other attacks. In this paper, we propose a new type of indirect validation where we have a two stage validation in place to check that if a suspected node is Sybil or not. We crosscheck belief data from local monitor nodes and community detection data from randomly selected global monitor nodes, and then validate a suspected node. The proposed approach is found to be with less computation overheads and less vulnerable to malicious attacks.
  • Keywords
    computer network security; peer-to-peer computing; P2P networks; Sybil attack; Sybil node detection; Sybil node mitigation; belief models; community detection data; global monitor nodes; indirect validation; local monitor nodes; malicious attacks; peer-to-peer networks; social networks; Communities; Computational modeling; Message passing; Monitoring; Nickel; Peer-to-peer computing; Social network services; Belief model; Community detection; Indirect validation; Message passing algorithm; Sybil detection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    India Conference (INDICON), 2014 Annual IEEE
  • Conference_Location
    Pune
  • Print_ISBN
    978-1-4799-5362-2
  • Type

    conf

  • DOI
    10.1109/INDICON.2014.7030375
  • Filename
    7030375