Show simple item record

Whanaungatanga: Sybil-proof routing with social networks
dc.description.abstractDecentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed hash table that is strongly resistant to the Sybil attack. This is the first solution to this problem with sublinear run time and space usage. The protocol uses the social connections between users to build routing tables that enable Sybil-resistant distributed hash table lookups. With a social network of N well-connected honest nodes, the protocol can tolerate up to O(N/log N) "attack edges" (social links from honest users to phony identities). This means that an adversary has to fool a large fraction of the honest users before any lookups will fail. The protocol builds routing tables that contain O(N log^(3/2) N) entries per node. Lookups take O(1) time. Simulation results, using social network graphs from LiveJournal, Flickr, and YouTube, confirm the analytical results.en_US
dc.format.extent14 p.en_US
dc.rightsCreative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unporteden_US
dc.subjectdistributed hash tableen_US
dc.titleWhanaungatanga: Sybil-proof routing with social networksen_US

Files in this item


This item appears in the following Collection(s)

Show simple item record

Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported
Except where otherwise noted, this item's license is described as Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported