{"id":"https://openalex.org/W2065332681","doi":"https://doi.org/10.1109/icc.2010.5501977","title":"Quantitative Analysis of the Sybil Attack and Effective Sybil Resistance in Peer-to-Peer Systems","display_name":"Quantitative Analysis of the Sybil Attack and Effective Sybil Resistance in Peer-to-Peer Systems","publication_year":2010,"publication_date":"2010-05-01","ids":{"openalex":"https://openalex.org/W2065332681","doi":"https://doi.org/10.1109/icc.2010.5501977","mag":"2065332681"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2010.5501977","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2010.5501977","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044272409","display_name":"O. Jetter","orcid":null},"institutions":[{"id":"https://openalex.org/I4210155526","display_name":"Institute for Telematics","ror":"https://ror.org/04hp0zc29","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210155526"]},{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"O. Jetter","raw_affiliation_strings":["Institute of Telematics, Karlsruhe Institute of Technology, Germany","Inst. of Telematics, Karlsruhe Inst. of Technol. (KIT), Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Telematics, Karlsruhe Institute of Technology, Germany","institution_ids":["https://openalex.org/I4210155526","https://openalex.org/I102335020"]},{"raw_affiliation_string":"Inst. of Telematics, Karlsruhe Inst. of Technol. (KIT), Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028618521","display_name":"Jochen Dinger","orcid":null},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]},{"id":"https://openalex.org/I4210155526","display_name":"Institute for Telematics","ror":"https://ror.org/04hp0zc29","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210155526"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"J. Dinger","raw_affiliation_strings":["Institute of Telematics, Karlsruhe Institute of Technology, Germany","Inst. of Telematics, Karlsruhe Inst. of Technol. (KIT), Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Telematics, Karlsruhe Institute of Technology, Germany","institution_ids":["https://openalex.org/I4210155526","https://openalex.org/I102335020"]},{"raw_affiliation_string":"Inst. of Telematics, Karlsruhe Inst. of Technol. (KIT), Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085339318","display_name":"Hannes Hartenstein","orcid":"https://orcid.org/0000-0003-3441-3180"},"institutions":[{"id":"https://openalex.org/I4210155526","display_name":"Institute for Telematics","ror":"https://ror.org/04hp0zc29","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210155526"]},{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"H. Hartenstein","raw_affiliation_strings":["Institute of Telematics, Karlsruhe Institute of Technology, Germany","Inst. of Telematics, Karlsruhe Inst. of Technol. (KIT), Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Telematics, Karlsruhe Institute of Technology, Germany","institution_ids":["https://openalex.org/I4210155526","https://openalex.org/I102335020"]},{"raw_affiliation_string":"Inst. of Telematics, Karlsruhe Inst. of Technol. (KIT), Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044272409"],"corresponding_institution_ids":["https://openalex.org/I102335020","https://openalex.org/I4210155526"],"apc_list":null,"apc_paid":null,"fwci":3.9173,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.93798001,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.9642479419708252},{"id":"https://openalex.org/keywords/bittorrent","display_name":"BitTorrent","score":0.8327078819274902},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.782214879989624},{"id":"https://openalex.org/keywords/distributed-hash-table","display_name":"Distributed hash table","score":0.7274924516677856},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.6141009330749512},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5665844082832336},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5322710275650024},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.45668187737464905},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4314754009246826},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.1382269263267517},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12131103873252869}],"concepts":[{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.9642479419708252},{"id":"https://openalex.org/C520566109","wikidata":"https://www.wikidata.org/wiki/Q133862","display_name":"BitTorrent","level":3,"score":0.8327078819274902},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.782214879989624},{"id":"https://openalex.org/C2780224649","wikidata":"https://www.wikidata.org/wiki/Q863506","display_name":"Distributed hash table","level":3,"score":0.7274924516677856},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.6141009330749512},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5665844082832336},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5322710275650024},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.45668187737464905},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4314754009246826},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.1382269263267517},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12131103873252869}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2010.5501977","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2010.5501977","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W91828656","https://openalex.org/W105601597","https://openalex.org/W1488150418","https://openalex.org/W1494181753","https://openalex.org/W1520914943","https://openalex.org/W1587208850","https://openalex.org/W2004075592","https://openalex.org/W2034698773","https://openalex.org/W2101890615","https://openalex.org/W2102025541","https://openalex.org/W2113042674","https://openalex.org/W2119245106","https://openalex.org/W2119971988","https://openalex.org/W2120869000","https://openalex.org/W2128368884","https://openalex.org/W2128564705","https://openalex.org/W2137361044","https://openalex.org/W2158049821","https://openalex.org/W2167554088","https://openalex.org/W2171957559","https://openalex.org/W2798206825","https://openalex.org/W4240443285","https://openalex.org/W4248388227","https://openalex.org/W6603686790","https://openalex.org/W6628918426","https://openalex.org/W6629523987","https://openalex.org/W6651671980","https://openalex.org/W6750109355"],"related_works":["https://openalex.org/W2150012016","https://openalex.org/W2163567792","https://openalex.org/W2041363710","https://openalex.org/W2065332681","https://openalex.org/W2089143594","https://openalex.org/W2142650056","https://openalex.org/W2537593250","https://openalex.org/W2182058177","https://openalex.org/W2104970618","https://openalex.org/W2117750087"],"abstract_inverted_index":{"Current":[0],"peer-to-peer":[1],"(P2P)":[2],"systems":[3],"are":[4,78,213,251],"vulnerable":[5],"to":[6,12,37,55,100,122,167,173,229,253],"a":[7,16,39,97,111,144,187,224,240],"variety":[8],"of":[9,15,26,75,90,104,114,132,181,210,217,233,258],"attacks":[10,92,106],"due":[11],"the":[13,24,44,49,52,59,63,87,102,115,119,129,136,164,169,178,199,231,256],"lack":[14],"central":[17],"authorization":[18],"authority.":[19],"The":[20,73,191],"Sybil":[21,91,105,116,124,133,182,211,236,259],"attack,":[22],"i.e.,":[23],"forging":[25],"multiple":[27],"identities,":[28],"is":[29,152,198],"crucial":[30],"as":[31],"it":[32],"can":[33],"enable":[34],"an":[35,56,83],"attacker":[36,57],"control":[38],"substantial":[40],"fraction":[41],"or":[42],"even":[43],"entire":[45],"P2P":[46,64],"system.":[47,138],"However,":[48],"correlation":[50],"between":[51],"resources":[53,172],"available":[54],"and":[58,93,126],"resulting":[60],"influence":[61,131,180],"on":[62,135,142,247],"system":[65,219],"has":[66],"yet":[67],"not":[68],"been":[69],"studied":[70],"in":[71,156,215],"detail.":[72],"contributions":[74],"our":[76],"paper":[77],"twofold:":[79],"i)":[80],"we":[81,95,109,127,184,205,222,250],"present":[82],"approach":[84,99,226],"for":[85,153],"assessing":[86],"actual":[88,170],"threats":[89],"ii)":[94],"propose":[96,223],"distributed":[98,147,242],"limit":[101,255],"impact":[103],"effectively.":[107],"Therefore,":[108],"conduct":[110],"thorough":[112],"analysis":[113],"attack":[117],"w.r.t.":[118],"resource":[120],"requirements":[121],"operate":[123,174],"nodes":[125,134,212],"investigate":[128],"quantitative":[130,179],"overall":[137],"Our":[139],"study":[140],"focuses":[141],"Kademlia,":[143],"very":[145],"popular":[146],"hash":[148],"table":[149],"(DHT)":[150],"which":[151],"instance":[154],"used":[155],"BitTorrent.":[157],"We":[158],"ran":[159],"extensive":[160],"Internet":[161],"measurements":[162],"within":[163],"BitTorrent":[165],"DHT":[166],"determine":[168],"required":[171],"nodes.":[175,260],"To":[176],"evaluate":[177],"nodes,":[183],"additionally":[185],"conducted":[186],"comprehensive":[188],"simulation":[189],"study.":[190],"results":[192],"show":[193],"that":[194,207],"upstream":[195],"network":[196],"bandwidth":[197],"dominating":[200],"factor":[201],"concerning":[202],"resources.":[203],"Furthermore,":[204],"illustrate":[206],"small":[208],"portions":[209],"tolerable":[214],"terms":[216],"global":[218],"stability.":[220],"Finally,":[221],"new":[225,241],"called":[227],"*RACING*":[228],"improve":[230],"resistance":[232],"DHTs":[234],"against":[235],"attacks.":[237],"By":[238],"establishing":[239],"identity":[243],"registration":[244],"procedure":[245],"based":[246],"IP":[248],"addresses,":[249],"able":[252],"effectively":[254],"number":[257]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
