DocumentCode
558726
Title
Securing P2P systems from Sybil attacks through adaptive identity management
Author
Cordeiro, Weverton Luis da Costa ; Santos, Flávio Roberto ; Mauch, Gustavo Huff ; Barcelos, Marinho Pilla ; Gaspary, Luciano Paschoal
Author_Institution
Inst. of Inf., Fed. Univ. of Rio Grande do Sul, Porto Alegre, Brazil
fYear
2011
fDate
24-28 Oct. 2011
Firstpage
1
Lastpage
6
Abstract
An effective approach to tackle Sybil attacks consists in establishing computational puzzles to be solved prior to granting new identities. Solutions based on this approach, despite their potential, do not distinguish between identity requests originated from correct users and attackers, requiring both to pay the same cost for an identity requested. Assuming computational puzzles of similar complexity, attackers having access to high performance computing hardware might be able to solve them orders of magnitude faster than legitimate users. Consequently, attackers may obtain a larger number of identities. However, simply increasing the complexity of puzzles would hamper the admission of legitimate peers to the network. To address this problem, we propose the use of adaptive computational puzzles as an approach to limit the spread of Sybils. The key idea is to estimate a trust score of the source from which identity requests depart, calculated as a proportion to the recurrence rate of identity requests originated from other sources. The higher the frequency (the) user(s) associated to a source perform(s) identity requests, the lower the trust score of that source and, consequently, the higher the complexity of the puzzle to be solved. Results achieved by means of an experimental evaluation show the effectiveness of our solution. While comparatively more complex puzzles are assigned to potential attackers, legitimate users are minimally penalized with easier-to-solve puzzles.
Keywords
peer-to-peer computing; security of data; P2P systems; Sybil attacks; adaptive computational puzzles; adaptive identity management; high performance computing hardware; Communities; Complexity theory; Equations; Mathematical model; Peer to peer computing; Proposals; Resilience;
fLanguage
English
Publisher
ieee
Conference_Titel
Network and Service Management (CNSM), 2011 7th International Conference on
Conference_Location
Paris
Print_ISBN
978-1-4577-1588-4
Electronic_ISBN
978-3-901882-44-9
Type
conf
Filename
6104016
Link To Document