A Model to Quantify the Success of a Sybil Attack Targeting RELOAD/Chord Resources

e-Archivo Repository

Show simple item record

dc.contributor.author Urueña Pascual, Manuel
dc.contributor.author Cuevas Rumín, Rubén
dc.contributor.author Cuevas Rumín, Ángel
dc.contributor.author Banchs Roca, Albert
dc.date.accessioned 2014-01-08T12:02:15Z
dc.date.accessioned 2014-01-09T13:47:04Z
dc.date.available 2014-01-09T13:47:04Z
dc.date.issued 2013-02
dc.identifier.bibliographicCitation IEEE Communications Letters, February 2013, 17(2), pp. 428 - 431
dc.identifier.issn 1089-7798
dc.identifier.uri http://hdl.handle.net/10016/18094
dc.description.abstract The Sybil attack is one of the most harmful security threats for distributed hash tables (DHTs). This attack is not only a theoretical one, but it has been spotted "in the wild", and even performed by researchers themselves to demonstrate its feasibility. In this letter we analyse the Sybil attack whose objective is that the targeted resource cannot be accessed by any user of a Chord DHT, by replacing all the replica nodes that store it with sybils. In particular, we propose a simple, yet complete model that provides the number of random node-IDs that an attacker would need to generate in order to succeed with certain probability. Therefore, our model enables to quantify the cost of performing a Sybil resource attack on RELOAD/Chord DHTs more accurately than previous works, and thus establishes the basis to measure the effectiveness of different solutions proposed in the literature to prevent or mitigate Sybil attacks.
dc.description.sponsorship This work has been partially supported by the EU FP7 TREND project (257740), the Spanish T2C2 project (TIN2008-06739-C04-01) and the Madrid MEDIANET project (S-2009/TIC-1468).
dc.description.sponsorship European Community's Seventh Framework Program
dc.format.extent 4
dc.format.mimetype application/pdf
dc.language.iso eng
dc.publisher IEEE
dc.subject.other Chord
dc.subject.other Distributed Hash Table (DHT)
dc.subject.other Kademlia
dc.subject.other P2PSIP
dc.subject.other Resource Location and Discovery (RELOAD)
dc.subject.other Sybil resource attack.
dc.title A Model to Quantify the Success of a Sybil Attack Targeting RELOAD/Chord Resources
dc.type article
dc.description.status Publicado
dc.relation.publisherversion http://dx.doi.org/10.1109/LCOMM.2013.011113.122220
dc.subject.eciencia Telecomunicaciones
dc.identifier.doi 10.1109/LCOMM.2013.011113.122220
dc.rights.accessRights openAccess
dc.relation.projectID info:eu-repo/grantAgreement/EC/FP7/257740
dc.relation.projectID Comunidad de Madrid. S2009/TIC-1468/MEDIANET
dc.type.version acceptedVersion
dc.identifier.publicationfirstpage 428
dc.identifier.publicationissue 2
dc.identifier.publicationlastpage 431
dc.identifier.publicationtitle IEEE Communications letters
dc.identifier.publicationvolume 17
dc.identifier.uxxi AR/0000013112
 Find Full text

Files in this item

*Click on file's image for preview. (Embargoed files's preview is not supported)

This item appears in the following Collection(s)

Show simple item record