Comparative Study and Evaluation of Solving Sybil Attack on Peer-To-Peer Network
Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 6)Publication Date: 2016-06-05
Authors : Anju Shukla; Prachi Damodhar Shahare;
Page : 2620-2623
Keywords : Peer-to-Peer P2P; Sybil Attack; security threats; various attacks;
Abstract
In computer networks, computing devices allows to exchange data with one another via a data link. Peer-to-peer model (P2P architecture) is a frequently used computer networking architecture in which each workstation, or node, has the same adaptability, capabilities and responsibilities. The idea behind this attack is that a single malicious identity can present multiple identities, and thus gain control over part of the network. Various counter measures to avoid the damages through this attack are considered [3]. The algorithms has already been proposed for mitigating the impact of Sybil attack in peer to peer network, but the detection of Sybil node is only on the sender side. In this paper, the algorithm is introduced which can detect the Sybil node on peer to peer network in both sender as well as receiver side. This will help to identify the malicious node and to maintain the consistency of information on network.
Other Latest Articles
- Developing Smart Student Attendance System Using Smart Phone Application
- Assessment of Physicochemical and Microbiological Quality of Jersey Cattle Raw Milk at Different Stages of Lactation
- Developing Curriculum of Bachelor at University of Foreign Language Studies in Vietnam
- Sensory Characteristics of Chevon Processed in Four Methods
- Image Clustering and Classification Using Modified ABC Algorithm
Last modified: 2021-07-01 14:39:08