Sybil attack

Known as: Pseudospoofing, Sybil problem, Sybilattack 
The Sybil attack in computer security is an attack wherein a reputation system is subverted by forging identities in peer-to-peer networks. It is… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Fully self-organized mobile ad hoc networks (MANETs) represent complex distributed systems that may also be part of a huge… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In this paper, we propose a timestamp series approach to defend against Sybil attack in a vehicular ad hoc network (VANET) based… (More)
  • figure 1
  • table 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Recommendation systems can be attacked in various ways, and the ultimate attack form is reached with a {\em sybil attack}, where… (More)
  • table 1
  • figure 1
  • figure 4
  • table 3
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
A sybil node impersonates other nodes by broadcasting messages with multiple node identifiers (ID). In contrast to existing… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Mobility is often a problem for providing security services in ad hoc networks. In this paper, we show that mobility can be used… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We consider the problem of defending against Sybil attacks using computational puzzles. A fundamental difficulty in such defenses… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
The robustness of peer-to-peer (P2P) networks, in particular of DHT-based overlay networks, suffers significantly when a Sybil… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Distributed Hash Tables (DHTs) are very efficient distributed systems for routing, but at the same time vulnerable to disruptive… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats… (More)
  • figure 1
Is this relevant?