{"id":"https://openalex.org/W1995018250","doi":"https://doi.org/10.1145/2486159.2486172","title":"SybilCast","display_name":"SybilCast","publication_year":2013,"publication_date":"2013-07-16","ids":{"openalex":"https://openalex.org/W1995018250","doi":"https://doi.org/10.1145/2486159.2486172","mag":"1995018250"},"language":"en","primary_location":{"id":"doi:10.1145/2486159.2486172","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2486159.2486172","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the twenty-fifth annual ACM symposium on Parallelism in algorithms and architectures","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042520814","display_name":"Seth Gilbert","orcid":"https://orcid.org/0000-0003-3298-7412"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Seth Lewis Gilbert","raw_affiliation_strings":["National University of Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036490031","display_name":"Chaodong Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Chaodong Zheng","raw_affiliation_strings":["National University of Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5042520814"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":0.7249,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.73281832,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"130","last_page":"139"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7878110408782959},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7126618027687073},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6329475045204163},{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.624853253364563},{"id":"https://openalex.org/keywords/download","display_name":"Download","score":0.5830329656600952},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.5628557205200195},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.48803916573524475},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48476141691207886},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.48229244351387024},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.4644947350025177},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4305095076560974},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3998265266418457},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.23427662253379822},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12344318628311157}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7878110408782959},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7126618027687073},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6329475045204163},{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.624853253364563},{"id":"https://openalex.org/C2780154274","wikidata":"https://www.wikidata.org/wiki/Q7126717","display_name":"Download","level":2,"score":0.5830329656600952},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.5628557205200195},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.48803916573524475},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48476141691207886},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.48229244351387024},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.4644947350025177},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4305095076560974},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3998265266418457},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.23427662253379822},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12344318628311157},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2486159.2486172","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2486159.2486172","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the twenty-fifth annual ACM symposium on Parallelism in algorithms and architectures","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4300000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1519080809","https://openalex.org/W1520914943","https://openalex.org/W1630733292","https://openalex.org/W1964657953","https://openalex.org/W2030315897","https://openalex.org/W2032824989","https://openalex.org/W2056830486","https://openalex.org/W2087092764","https://openalex.org/W2100671335","https://openalex.org/W2104479802","https://openalex.org/W2111579580","https://openalex.org/W2124952412","https://openalex.org/W2131128575","https://openalex.org/W2135300639","https://openalex.org/W2137389501","https://openalex.org/W2150941206","https://openalex.org/W2165491783","https://openalex.org/W4241226388","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2028024605","https://openalex.org/W2805481311","https://openalex.org/W2107920298","https://openalex.org/W4385483253","https://openalex.org/W2963194396","https://openalex.org/W2108894808","https://openalex.org/W1991113998","https://openalex.org/W2053071509","https://openalex.org/W4308820260","https://openalex.org/W4308820185"],"abstract_inverted_index":{"Consider":[0],"a":[1,13,74,84,109,120],"scenario":[2],"where":[3],"many":[4],"wireless":[5,88],"users":[6,21,25],"are":[7,22,150],"attempting":[8],"to":[9,31,49,72],"download":[10,131],"data":[11,130],"from":[12],"single":[14],"base":[15],"station.":[16],"While":[17],"most":[18],"of":[19,38,55,63,94,112,116,139,156],"the":[20,39,46,64,92,117,144,153,164],"honest,":[23],"some":[24],"may":[26],"be":[27],"malicious":[28],"and":[29,97,152,176],"attempt":[30],"obtain":[32],"more":[33],"than":[34],"their":[35,113],"fair":[36,114],"share":[37,62,115],"bandwidth.":[40,65,118],"One":[41],"possible":[42],"strategy":[43],"for":[44,86],"attacking":[45],"system":[47],"is":[48,57,69,142],"simulate":[50],"multiple":[51],"fake":[52,95,157],"identities,":[53,96],"each":[54,103,122],"which":[56,147],"given":[58],"its":[59],"own":[60],"equal":[61],"Such":[66],"an":[67],"attack":[68],"often":[70],"referred":[71],"as":[73],"sybil":[75,168],"attack.":[76],"To":[77],"counter":[78],"such":[79],"behavior,":[80],"we":[81],"propose":[82],"SybilCast,":[83],"protocol":[85,141,171],"multichannel":[87],"networks":[89],"that":[90,102,159],"limits":[91],"number":[93,155],"in":[98,132],"doing":[99],"so,":[100],"ensures":[101],"honest":[104,123],"user":[105,124],"gets":[106],"at":[107,146],"least":[108],"constant":[110],"fraction":[111],"As":[119],"result,":[121],"can":[125,160,172],"complete":[126],"his":[127],"or":[128],"her":[129],"asymptotically":[133],"optimal":[134],"time.":[135],"A":[136],"key":[137],"aspect":[138],"this":[140],"balancing":[143],"rate":[145],"new":[148],"identities":[149,158],"admitted":[151],"maximum":[154],"co-exist,":[161],"while":[162],"keeping":[163],"overhead":[165],"low.":[166],"Besides":[167],"attacks,":[169],"our":[170],"also":[173],"tolerate":[174],"spoofing":[175],"jamming.":[177]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
