• DocumentCode
    623688
  • Title

    SybilShield: An agent-aided social network-based Sybil defense among multiple communities

  • Author

    Lu Shi ; Shucheng Yu ; Wenjing Lou ; Hou, Y.T.

  • Author_Institution
    Dept. of Comput. Sci., Univ. of Arkansas at Little Rock, Little Rock, AR, USA
  • fYear
    2013
  • fDate
    14-19 April 2013
  • Firstpage
    1034
  • Lastpage
    1042
  • Abstract
    Lacking trusted central authority, distributed systems have received serious security threats from Sybil attack, where an adversary forges identities of more than one node and attempts to control the system. By utilizing the real-world trust relationships between users, social network-based defense schemes have been proposed to mitigate the impact of Sybil attacks. These solutions are mostly built on the assumption that the social network graph can be partitioned into two loosely linked regions - a tightly connected non-Sybil region and a Sybil region. Although such an assumption may hold in certain settings, studies have shown that the real-world social connections tend to divide users into multiple inter-connected small worlds instead of a single uniformly connected large region. Given this fact, the applicability of existing schemes would be greatly undermined for inability to distinguish Sybil users from valid ones in the small non-Sybil regions. This paper addresses this problem and presents SybilShield, the first protocol that defends against Sybil attack utilizing multi-community social network structure in real world. Our scheme leverages the sociological property that the number of cutting edges between a non-Sybil community and a Sybil community, which represent human-established trust relationships, is much smaller than that among non-Sybil communities. With the help of agent nodes, SybilShield greatly reduces false positive rate of non-Sybils among multiple communities, while effectively identifying Sybil nodes. Analytical results prove the superiority of SybilShield. Our experiments on a real-world social network graph with 100,000 nodes also validate the effectiveness of SybilShield.
  • Keywords
    distributed processing; graph theory; multi-agent systems; network theory (graphs); security of data; trusted computing; Sybil attack impact mitigation; Sybil users; SybilShield; adversary; agent node; agent-aided social network-based Sybil defense; distributed system; human-established trust relationship; identity forging; loosely linked region; multicommunity social network structure; multiple interconnected small world; protocol; serious security threat; single uniformly connected large region; social connection; social network graph partitioning; sociological property; system control; tightly connected nonSybil region; trusted central authority; Communities; Image edge detection; Peer-to-peer computing; Routing; Routing protocols; Social network services;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    INFOCOM, 2013 Proceedings IEEE
  • Conference_Location
    Turin
  • ISSN
    0743-166X
  • Print_ISBN
    978-1-4673-5944-3
  • Type

    conf

  • DOI
    10.1109/INFCOM.2013.6566893
  • Filename
    6566893