DocumentCode :
623688
Title :
SybilShield: An agent-aided social network-based Sybil defense among multiple communities
Author :
Lu Shi ; Shucheng Yu ; Wenjing Lou ; Hou, Y.T.
Author_Institution :
Dept. of Comput. Sci., Univ. of Arkansas at Little Rock, Little Rock, AR, USA
fYear :
2013
fDate :
14-19 April 2013
Firstpage :
1034
Lastpage :
1042
Abstract :
Lacking trusted central authority, distributed systems have received serious security threats from Sybil attack, where an adversary forges identities of more than one node and attempts to control the system. By utilizing the real-world trust relationships between users, social network-based defense schemes have been proposed to mitigate the impact of Sybil attacks. These solutions are mostly built on the assumption that the social network graph can be partitioned into two loosely linked regions - a tightly connected non-Sybil region and a Sybil region. Although such an assumption may hold in certain settings, studies have shown that the real-world social connections tend to divide users into multiple inter-connected small worlds instead of a single uniformly connected large region. Given this fact, the applicability of existing schemes would be greatly undermined for inability to distinguish Sybil users from valid ones in the small non-Sybil regions. This paper addresses this problem and presents SybilShield, the first protocol that defends against Sybil attack utilizing multi-community social network structure in real world. Our scheme leverages the sociological property that the number of cutting edges between a non-Sybil community and a Sybil community, which represent human-established trust relationships, is much smaller than that among non-Sybil communities. With the help of agent nodes, SybilShield greatly reduces false positive rate of non-Sybils among multiple communities, while effectively identifying Sybil nodes. Analytical results prove the superiority of SybilShield. Our experiments on a real-world social network graph with 100,000 nodes also validate the effectiveness of SybilShield.
Keywords :
distributed processing; graph theory; multi-agent systems; network theory (graphs); security of data; trusted computing; Sybil attack impact mitigation; Sybil users; SybilShield; adversary; agent node; agent-aided social network-based Sybil defense; distributed system; human-established trust relationship; identity forging; loosely linked region; multicommunity social network structure; multiple interconnected small world; protocol; serious security threat; single uniformly connected large region; social connection; social network graph partitioning; sociological property; system control; tightly connected nonSybil region; trusted central authority; Communities; Image edge detection; Peer-to-peer computing; Routing; Routing protocols; Social network services;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
INFOCOM, 2013 Proceedings IEEE
Conference_Location :
Turin
ISSN :
0743-166X
Print_ISBN :
978-1-4673-5944-3
Type :
conf
DOI :
10.1109/INFCOM.2013.6566893
Filename :
6566893
Link To Document :
بازگشت