A Review of Techniques to Mitigate Sybil Attacks

Any decentralised distributed network is particularly vulnerable to the Sybil attack wherein a malicious node masquerades as several different nodes, called Sybil nodes, simultaneously in an attempt to disrupt the proper functioning of the network. Such attacks may cause damage on a fairly large scale especially since they are difficult to detect and there has been no universally accepted scheme to counter them as yet. In this paper, we discuss the different kinds of Sybil attacks including those occurring in peer-to-peer reputation systems, self-organising networks and even social network systems. In addition, various methods that have been suggested over time to decrease or eliminate their risk completely are also analysed along with their modus operandi.

[1]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[2]  Philip W. L. Fong Relationship-based access control: protection model and policy language , 2011, CODASPY '11.

[3]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[4]  T. Kohno,et al.  Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[5]  Christian Scheideler,et al.  Group Spreading: A Protocol for Provably Secure Distributed Name Service , 2004, ICALP.

[6]  Diogo Monica,et al.  Thwarting The Sybil Attack in Wireless Ad Hoc Networks , 2009 .

[7]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[8]  Philip W. L. Fong Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems , 2011, 2011 IEEE Symposium on Security and Privacy.

[9]  Brian Neil Levine,et al.  Informant: Detecting Sybils Using Incentives , 2007, Financial Cryptography.

[10]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[11]  Brian Neil Levine,et al.  A Survey of Solutions to the Sybil Attack , 2006 .

[12]  Michael Sirivianos,et al.  Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.

[13]  George Kesidis,et al.  Robust Sybil Detection for MANETs , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[14]  Mohammad Ilyas,et al.  Secure Routing in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.

[15]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[16]  Mary Baker,et al.  Preserving peer replicas by rate-limited sampled voting , 2003, SOSP '03.

[17]  Tricia Walker,et al.  Computer science , 1996, English for academic purposes series.

[18]  Wei Hong,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .

[19]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[20]  Mary Baker,et al.  The LOCKSS peer-to-peer digital preservation system , 2005, TOCS.

[21]  Barbara Carminati,et al.  Enforcing relationships privacy through collaborative access control in web-based Social Networks , 2009, 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[22]  Sugata Sanyal,et al.  A distributed security scheme for ad hoc networks , 2004, CROS.

[23]  Philip W. L. Fong,et al.  Relationship-based access control policies and their policy languages , 2011, SACMAT '11.