The Sybil Attack View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2002-10-10

AUTHORS

John R. Douceur

ABSTRACT

Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these “Sybil attacks” is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities. More... »

PAGES

251-260

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/3-540-45748-8_24

DOI

http://dx.doi.org/10.1007/3-540-45748-8_24

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1017377900


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Microsoft (United States)", 
          "id": "https://www.grid.ac/institutes/grid.419815.0", 
          "name": [
            "Microsoft Research, One Microsoft Way, 98052-6399, Redmond, WA, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Douceur", 
        "givenName": "John R.", 
        "id": "sg:person.013123640144.09", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013123640144.09"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "sg:pub.10.1007/bf02351717", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1001094212", 
          "https://doi.org/10.1007/bf02351717"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/bf02351717", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1001094212", 
          "https://doi.org/10.1007/bf02351717"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/359460.359473", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1002970554"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/168588.168596", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1032246154"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/358549.358563", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1042225009"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/2.863969", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061106279"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/adl.1998.670389", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093777752"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2002-10-10", 
    "datePublishedReg": "2002-10-10", 
    "description": "Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these \u201cSybil attacks\u201d is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.", 
    "editor": [
      {
        "familyName": "Druschel", 
        "givenName": "Peter", 
        "type": "Person"
      }, 
      {
        "familyName": "Kaashoek", 
        "givenName": "Frans", 
        "type": "Person"
      }, 
      {
        "familyName": "Rowstron", 
        "givenName": "Antony", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/3-540-45748-8_24", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-44179-3", 
        "978-3-540-45748-0"
      ], 
      "name": "Peer-to-Peer Systems", 
      "type": "Book"
    }, 
    "name": "The Sybil Attack", 
    "pagination": "251-260", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/3-540-45748-8_24"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "52cb7351fd52d5278abab8ae34359e3554d9a9ab552ad17f343c33ded0699b50"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1017377900"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/3-540-45748-8_24", 
      "https://app.dimensions.ai/details/publication/pub.1017377900"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T05:29", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000346_0000000346/records_99802_00000001.jsonl", 
    "type": "Chapter", 
    "url": "https://link.springer.com/10.1007%2F3-540-45748-8_24"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-45748-8_24'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-45748-8_24'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-45748-8_24'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-45748-8_24'


 

This table displays all metadata directly associated to this object as RDF triples.

94 TRIPLES      23 PREDICATES      32 URIs      19 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/3-540-45748-8_24 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author N597b03713439407db57a8a4cda387666
4 schema:citation sg:pub.10.1007/bf02351717
5 https://doi.org/10.1109/2.863969
6 https://doi.org/10.1109/adl.1998.670389
7 https://doi.org/10.1145/168588.168596
8 https://doi.org/10.1145/358549.358563
9 https://doi.org/10.1145/359460.359473
10 schema:datePublished 2002-10-10
11 schema:datePublishedReg 2002-10-10
12 schema:description Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these “Sybil attacks” is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
13 schema:editor Ne32f7784cc094655846109d4ae9de22e
14 schema:genre chapter
15 schema:inLanguage en
16 schema:isAccessibleForFree false
17 schema:isPartOf N53b0e7d16f564fb0b3e1d9dcf3bf6637
18 schema:name The Sybil Attack
19 schema:pagination 251-260
20 schema:productId N1072ad7d8faf45cc942365c6c6e833b5
21 N76995b8e90124938b7477a8f549f1d10
22 Nab5c12ca96e244148e0a71e6c2b34d6b
23 schema:publisher Nbad0913d059f4d7db223a879e6c81c99
24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017377900
25 https://doi.org/10.1007/3-540-45748-8_24
26 schema:sdDatePublished 2019-04-16T05:29
27 schema:sdLicense https://scigraph.springernature.com/explorer/license/
28 schema:sdPublisher N1a1beb7d3af1487fbb00c2218da0fc13
29 schema:url https://link.springer.com/10.1007%2F3-540-45748-8_24
30 sgo:license sg:explorer/license/
31 sgo:sdDataset chapters
32 rdf:type schema:Chapter
33 N1072ad7d8faf45cc942365c6c6e833b5 schema:name dimensions_id
34 schema:value pub.1017377900
35 rdf:type schema:PropertyValue
36 N1a1beb7d3af1487fbb00c2218da0fc13 schema:name Springer Nature - SN SciGraph project
37 rdf:type schema:Organization
38 N2ac292ed99b040839a23881a7ab275ae rdf:first N6e5b582e3eb14ac780d36f68737e0f11
39 rdf:rest rdf:nil
40 N3b3d66eee33e4bfba57ba3ca4ba4034b schema:familyName Druschel
41 schema:givenName Peter
42 rdf:type schema:Person
43 N53b0e7d16f564fb0b3e1d9dcf3bf6637 schema:isbn 978-3-540-44179-3
44 978-3-540-45748-0
45 schema:name Peer-to-Peer Systems
46 rdf:type schema:Book
47 N597b03713439407db57a8a4cda387666 rdf:first sg:person.013123640144.09
48 rdf:rest rdf:nil
49 N6e5b582e3eb14ac780d36f68737e0f11 schema:familyName Rowstron
50 schema:givenName Antony
51 rdf:type schema:Person
52 N76995b8e90124938b7477a8f549f1d10 schema:name readcube_id
53 schema:value 52cb7351fd52d5278abab8ae34359e3554d9a9ab552ad17f343c33ded0699b50
54 rdf:type schema:PropertyValue
55 N7775eef135914cca9b5fde149f141f0e rdf:first N80c4424b0ba74f5bb58852b53a7be545
56 rdf:rest N2ac292ed99b040839a23881a7ab275ae
57 N80c4424b0ba74f5bb58852b53a7be545 schema:familyName Kaashoek
58 schema:givenName Frans
59 rdf:type schema:Person
60 Nab5c12ca96e244148e0a71e6c2b34d6b schema:name doi
61 schema:value 10.1007/3-540-45748-8_24
62 rdf:type schema:PropertyValue
63 Nbad0913d059f4d7db223a879e6c81c99 schema:location Berlin, Heidelberg
64 schema:name Springer Berlin Heidelberg
65 rdf:type schema:Organisation
66 Ne32f7784cc094655846109d4ae9de22e rdf:first N3b3d66eee33e4bfba57ba3ca4ba4034b
67 rdf:rest N7775eef135914cca9b5fde149f141f0e
68 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
69 schema:name Information and Computing Sciences
70 rdf:type schema:DefinedTerm
71 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
72 schema:name Information Systems
73 rdf:type schema:DefinedTerm
74 sg:person.013123640144.09 schema:affiliation https://www.grid.ac/institutes/grid.419815.0
75 schema:familyName Douceur
76 schema:givenName John R.
77 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013123640144.09
78 rdf:type schema:Person
79 sg:pub.10.1007/bf02351717 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001094212
80 https://doi.org/10.1007/bf02351717
81 rdf:type schema:CreativeWork
82 https://doi.org/10.1109/2.863969 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061106279
83 rdf:type schema:CreativeWork
84 https://doi.org/10.1109/adl.1998.670389 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093777752
85 rdf:type schema:CreativeWork
86 https://doi.org/10.1145/168588.168596 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032246154
87 rdf:type schema:CreativeWork
88 https://doi.org/10.1145/358549.358563 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042225009
89 rdf:type schema:CreativeWork
90 https://doi.org/10.1145/359460.359473 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002970554
91 rdf:type schema:CreativeWork
92 https://www.grid.ac/institutes/grid.419815.0 schema:alternateName Microsoft (United States)
93 schema:name Microsoft Research, One Microsoft Way, 98052-6399, Redmond, WA, USA
94 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...