The Sybil Attack

Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these "Sybil attacks" is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.

IPTPS2002.pdf
PDF file

In  Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS)

Details

TypeInproceedings
> Publications > The Sybil Attack