SRJE: Decentralized authentication scheme against sybil attacks

Yo Mashimo, Masanori Yasutomi, Hiroshi Shigeno

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In P2P networks, there are attacks known as Sybil attacks, where malicious users attempt to gain control over the network by using multiple nodes. To inhibit Sybil attacks, it is effective to set limits on the number of nodes per user. A decentralized authentication method, referred to as self-registration, in which the rule of majority is used to set a limit on the number of nodes in DHT (Distributed Hash Table) networks, has been proposed. However, self-registration is not effective against increasing the number is malicious users. In this paper, we propose a more reliable method by applying a local trust mechanism (SRJE, Self-Registration with Judgement Evaluation), which uses an original surveillance mechanism for self-registration. We show the effectiveness of SRJE by performing simulations comparing SRJE with self-registration.

Original languageEnglish
Title of host publicationNBiS 2009 - 12th International Conference on Network-Based Information Systems
Pages220-225
Number of pages6
DOIs
Publication statusPublished - 2009
EventNBiS 2009 - 12th International Conference on Network-Based Information Systems - Indianapolis, IN, United States
Duration: 2009 Aug 192009 Aug 21

Other

OtherNBiS 2009 - 12th International Conference on Network-Based Information Systems
CountryUnited States
CityIndianapolis, IN
Period09/8/1909/8/21

Fingerprint

Gain control
Authentication

Keywords

  • DHT
  • P2P
  • Security
  • Sybil attack

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems

Cite this

Mashimo, Y., Yasutomi, M., & Shigeno, H. (2009). SRJE: Decentralized authentication scheme against sybil attacks. In NBiS 2009 - 12th International Conference on Network-Based Information Systems (pp. 220-225). [5350024] https://doi.org/10.1109/NBiS.2009.54

SRJE : Decentralized authentication scheme against sybil attacks. / Mashimo, Yo; Yasutomi, Masanori; Shigeno, Hiroshi.

NBiS 2009 - 12th International Conference on Network-Based Information Systems. 2009. p. 220-225 5350024.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mashimo, Y, Yasutomi, M & Shigeno, H 2009, SRJE: Decentralized authentication scheme against sybil attacks. in NBiS 2009 - 12th International Conference on Network-Based Information Systems., 5350024, pp. 220-225, NBiS 2009 - 12th International Conference on Network-Based Information Systems, Indianapolis, IN, United States, 09/8/19. https://doi.org/10.1109/NBiS.2009.54
Mashimo Y, Yasutomi M, Shigeno H. SRJE: Decentralized authentication scheme against sybil attacks. In NBiS 2009 - 12th International Conference on Network-Based Information Systems. 2009. p. 220-225. 5350024 https://doi.org/10.1109/NBiS.2009.54
Mashimo, Yo ; Yasutomi, Masanori ; Shigeno, Hiroshi. / SRJE : Decentralized authentication scheme against sybil attacks. NBiS 2009 - 12th International Conference on Network-Based Information Systems. 2009. pp. 220-225
@inproceedings{34c071220c4c4397957c0fedab673fb0,
title = "SRJE: Decentralized authentication scheme against sybil attacks",
abstract = "In P2P networks, there are attacks known as Sybil attacks, where malicious users attempt to gain control over the network by using multiple nodes. To inhibit Sybil attacks, it is effective to set limits on the number of nodes per user. A decentralized authentication method, referred to as self-registration, in which the rule of majority is used to set a limit on the number of nodes in DHT (Distributed Hash Table) networks, has been proposed. However, self-registration is not effective against increasing the number is malicious users. In this paper, we propose a more reliable method by applying a local trust mechanism (SRJE, Self-Registration with Judgement Evaluation), which uses an original surveillance mechanism for self-registration. We show the effectiveness of SRJE by performing simulations comparing SRJE with self-registration.",
keywords = "DHT, P2P, Security, Sybil attack",
author = "Yo Mashimo and Masanori Yasutomi and Hiroshi Shigeno",
year = "2009",
doi = "10.1109/NBiS.2009.54",
language = "English",
isbn = "9780769537672",
pages = "220--225",
booktitle = "NBiS 2009 - 12th International Conference on Network-Based Information Systems",

}

TY - GEN

T1 - SRJE

T2 - Decentralized authentication scheme against sybil attacks

AU - Mashimo, Yo

AU - Yasutomi, Masanori

AU - Shigeno, Hiroshi

PY - 2009

Y1 - 2009

N2 - In P2P networks, there are attacks known as Sybil attacks, where malicious users attempt to gain control over the network by using multiple nodes. To inhibit Sybil attacks, it is effective to set limits on the number of nodes per user. A decentralized authentication method, referred to as self-registration, in which the rule of majority is used to set a limit on the number of nodes in DHT (Distributed Hash Table) networks, has been proposed. However, self-registration is not effective against increasing the number is malicious users. In this paper, we propose a more reliable method by applying a local trust mechanism (SRJE, Self-Registration with Judgement Evaluation), which uses an original surveillance mechanism for self-registration. We show the effectiveness of SRJE by performing simulations comparing SRJE with self-registration.

AB - In P2P networks, there are attacks known as Sybil attacks, where malicious users attempt to gain control over the network by using multiple nodes. To inhibit Sybil attacks, it is effective to set limits on the number of nodes per user. A decentralized authentication method, referred to as self-registration, in which the rule of majority is used to set a limit on the number of nodes in DHT (Distributed Hash Table) networks, has been proposed. However, self-registration is not effective against increasing the number is malicious users. In this paper, we propose a more reliable method by applying a local trust mechanism (SRJE, Self-Registration with Judgement Evaluation), which uses an original surveillance mechanism for self-registration. We show the effectiveness of SRJE by performing simulations comparing SRJE with self-registration.

KW - DHT

KW - P2P

KW - Security

KW - Sybil attack

UR - http://www.scopus.com/inward/record.url?scp=74549195575&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=74549195575&partnerID=8YFLogxK

U2 - 10.1109/NBiS.2009.54

DO - 10.1109/NBiS.2009.54

M3 - Conference contribution

AN - SCOPUS:74549195575

SN - 9780769537672

SP - 220

EP - 225

BT - NBiS 2009 - 12th International Conference on Network-Based Information Systems

ER -