DocumentCode
2317752
Title
Sybil defenses in mobile social networks
Author
Wei Chang ; Jie Wu ; Tan, Chiu C. ; Feng Li
Author_Institution
Temple Univ., Philadelphia, PA, USA
fYear
2013
fDate
9-13 Dec. 2013
Firstpage
641
Lastpage
646
Abstract
Mobile social networks are vulnerable to Sybil attacks. By creating a large number of fake identities, malicious users can gain a disproportionately high benefit through a Byzantine fashion. Most social network-based Sybil defenses adopt the assumptions that the honest region is a fast-mixing network. However, more and more evidence shows that some real social networks are not fast-mixing, especially when only strong-trust relations are considered. Moreover, the accuracy of all existing solutions is related to the number of attack edges that the adversary can build. In this paper, for addressing these problems, we propose a local ranking system for estimating trust-level between users. Our scheme has three unique features. First, our system is based on both trust and distrust relations. Second, instead of storing the entire social graph, users carry limited information related to themselves. Last but not least, our system weakens the impacts of attack edges by removing several suspicious edges with high centrality. We validate the effectiveness of our solutions through comprehensive experiments.
Keywords
mobile computing; social networking (online); trusted computing; Byzantine fashion; Sybil attacks; Sybil defenses; fast-mixing network; local ranking system; malicious users; mobile social networks; Accuracy; Communities; Image edge detection; Logic gates; Security; Servers; Social network services; Community; distrust; local gateway; mobile social networks; signed social networks; sybil attacks;
fLanguage
English
Publisher
ieee
Conference_Titel
Global Communications Conference (GLOBECOM), 2013 IEEE
Conference_Location
Atlanta, GA
Type
conf
DOI
10.1109/GLOCOM.2013.6831144
Filename
6831144
Link To Document