Publication:
A Model to Quantify the Success of a Sybil Attack Targeting RELOAD/Chord Resources

dc.affiliation.dptoUC3M. Departamento de Ingeniería Telemáticaes
dc.affiliation.grupoinvUC3M. Grupo de Investigación: Network Technologieses
dc.contributor.authorUrueña Pascual, Manuel
dc.contributor.authorCuevas Rumín, Rubén
dc.contributor.authorCuevas Rumín, Ángel
dc.contributor.authorBanchs Roca, Albert
dc.date.accessioned2014-01-08T12:02:15Z
dc.date.accessioned2014-01-09T13:47:04Z
dc.date.available2014-01-09T13:47:04Z
dc.date.issued2013-02
dc.description.abstractThe Sybil attack is one of the most harmful security threats for distributed hash tables (DHTs). This attack is not only a theoretical one, but it has been spotted "in the wild", and even performed by researchers themselves to demonstrate its feasibility. In this letter we analyse the Sybil attack whose objective is that the targeted resource cannot be accessed by any user of a Chord DHT, by replacing all the replica nodes that store it with sybils. In particular, we propose a simple, yet complete model that provides the number of random node-IDs that an attacker would need to generate in order to succeed with certain probability. Therefore, our model enables to quantify the cost of performing a Sybil resource attack on RELOAD/Chord DHTs more accurately than previous works, and thus establishes the basis to measure the effectiveness of different solutions proposed in the literature to prevent or mitigate Sybil attacks.en
dc.description.sponsorshipThis work has been partially supported by the EU FP7 TREND project (257740), the Spanish T2C2 project (TIN2008-06739-C04-01) and the Madrid MEDIANET project (S-2009/TIC-1468).en
dc.description.sponsorshipEuropean Community's Seventh Framework Programen
dc.description.statusPublicadoes
dc.format.extent4
dc.format.mimetypeapplication/pdf
dc.identifier.bibliographicCitationIEEE Communications Letters, February 2013, 17(2), pp. 428 - 431en
dc.identifier.doi10.1109/LCOMM.2013.011113.122220
dc.identifier.issn1089-7798
dc.identifier.publicationfirstpage428
dc.identifier.publicationissue2
dc.identifier.publicationlastpage431
dc.identifier.publicationtitleIEEE Communications lettersen
dc.identifier.publicationvolume17
dc.identifier.urihttps://hdl.handle.net/10016/18094
dc.identifier.uxxiAR/0000013112
dc.language.isoeng
dc.publisherIEEE
dc.relation.projectIDinfo:eu-repo/grantAgreement/EC/FP7/257740
dc.relation.projectIDComunidad de Madrid. S2009/TIC-1468/MEDIANETes
dc.relation.publisherversionhttp://dx.doi.org/10.1109/LCOMM.2013.011113.122220
dc.rights.accessRightsopen access
dc.subject.ecienciaTelecomunicacioneses
dc.subject.otherChorden
dc.subject.otherDistributed Hash Table (DHT)en
dc.subject.otherKademliaen
dc.subject.otherP2PSIPen
dc.subject.otherResource Location and Discovery (RELOAD)en
dc.subject.otherSybil resource attack.en
dc.titleA Model to Quantify the Success of a Sybil Attack Targeting RELOAD/Chord Resourcesen
dc.typeresearch article*
dc.type.hasVersionAM*
dspace.entity.typePublication
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
model_IEEECL_2013_ps.pdf
Size:
411.29 KB
Format:
Adobe Portable Document Format