{"id":"https://openalex.org/W2135264770","doi":"https://doi.org/10.1145/2590296.2590326","title":"Design and evaluation of persea, a sybil-resistant DHT","display_name":"Design and evaluation of persea, a sybil-resistant DHT","publication_year":2014,"publication_date":"2014-05-30","ids":{"openalex":"https://openalex.org/W2135264770","doi":"https://doi.org/10.1145/2590296.2590326","mag":"2135264770"},"language":"en","primary_location":{"id":"doi:10.1145/2590296.2590326","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2590296.2590326","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041581450","display_name":"Mahdi Nasrullah Al-Ameen","orcid":"https://orcid.org/0000-0002-5764-2253"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mahdi Nasrullah Al-Ameen","raw_affiliation_strings":["The University of Texas at Arlington, Arlington, TX, USA"],"affiliations":[{"raw_affiliation_string":"The University of Texas at Arlington, Arlington, TX, USA","institution_ids":["https://openalex.org/I189196454"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035719182","display_name":"Matthew Wright","orcid":"https://orcid.org/0000-0002-8489-6347"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matthew Wright","raw_affiliation_strings":["The University of Texas at Arlington, Arlington, TX, USA"],"affiliations":[{"raw_affiliation_string":"The University of Texas at Arlington, Arlington, TX, USA","institution_ids":["https://openalex.org/I189196454"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5041581450"],"corresponding_institution_ids":["https://openalex.org/I189196454"],"apc_list":null,"apc_paid":null,"fwci":1.3792,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.84659852,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"75","last_page":"86"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/distributed-hash-table","display_name":"Distributed hash table","score":0.818606972694397},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7443405389785767},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6783928871154785},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6066163182258606},{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.5992705821990967},{"id":"https://openalex.org/keywords/joins","display_name":"Joins","score":0.5578967928886414},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5093792676925659},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.4364827275276184},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4107442796230316},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3712615370750427},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.35143235325813293},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.11817562580108643},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08368945121765137}],"concepts":[{"id":"https://openalex.org/C2780224649","wikidata":"https://www.wikidata.org/wiki/Q863506","display_name":"Distributed hash table","level":3,"score":0.818606972694397},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7443405389785767},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6783928871154785},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6066163182258606},{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.5992705821990967},{"id":"https://openalex.org/C2778692605","wikidata":"https://www.wikidata.org/wiki/Q4041866","display_name":"Joins","level":2,"score":0.5578967928886414},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5093792676925659},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.4364827275276184},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4107442796230316},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3712615370750427},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.35143235325813293},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.11817562580108643},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08368945121765137},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2590296.2590326","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2590296.2590326","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G2443481513","display_name":null,"funder_award_id":"CNS-0954133","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"},{"id":"https://openalex.org/G4915919117","display_name":null,"funder_award_id":"CNS-1117866","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W91828656","https://openalex.org/W1502591710","https://openalex.org/W1520914943","https://openalex.org/W1551760018","https://openalex.org/W1581099039","https://openalex.org/W1587208850","https://openalex.org/W1922737625","https://openalex.org/W1989643196","https://openalex.org/W1992685726","https://openalex.org/W2006375909","https://openalex.org/W2043525604","https://openalex.org/W2047443612","https://openalex.org/W2099399367","https://openalex.org/W2101890615","https://openalex.org/W2104112849","https://openalex.org/W2116236383","https://openalex.org/W2118765159","https://openalex.org/W2119245106","https://openalex.org/W2120111750","https://openalex.org/W2127503167","https://openalex.org/W2134320193","https://openalex.org/W2134919842","https://openalex.org/W2139144138","https://openalex.org/W2140655729","https://openalex.org/W2140832016","https://openalex.org/W2147021670","https://openalex.org/W2150669728","https://openalex.org/W2150941206","https://openalex.org/W2153644028","https://openalex.org/W2157826538","https://openalex.org/W2158049821","https://openalex.org/W2159675343","https://openalex.org/W2163059190","https://openalex.org/W2167898414","https://openalex.org/W2168508162","https://openalex.org/W2398500214","https://openalex.org/W4240443285","https://openalex.org/W4241423304"],"related_works":["https://openalex.org/W2114051705","https://openalex.org/W2065332681","https://openalex.org/W2147857667","https://openalex.org/W2537593250","https://openalex.org/W2182058177","https://openalex.org/W2547928086","https://openalex.org/W2349433178","https://openalex.org/W2104970618","https://openalex.org/W1534387809","https://openalex.org/W2134320193"],"abstract_inverted_index":{"P2P":[0,34,62,193],"systems":[1,63],"are":[2,233],"inherently":[3],"vulnerable":[4],"to":[5,21,95,103,133,157,162,180,203],"Sybil":[6,39],"attacks,":[7],"in":[8,106,123,166,190,222,230,263,266],"which":[9,223],"an":[10,117,120],"attacker":[11,155,178],"creates":[12],"a":[13,23,32,45,89,130,140,160,176,181,191,205,219,242],"large":[14,177],"number":[15],"of":[16,26,50,92,142,151,172,185],"identities":[17],"and":[18,84,137,265,272],"uses":[19,218],"them":[20],"control":[22],"substantial":[24],"fraction":[25],"the":[27,48,55,78,124,134,154,167,186,212,237,249],"system.":[28,125,168,194],"We":[29,195,260],"propose":[30],"Persea,":[31],"novel":[33],"system":[35,56],"that":[36,77,86,232,274],"derives":[37],"its":[38],"resistance":[40],"by":[41,247],"assigning":[42],"IDs":[43,144,174],"through":[44,57],"bootstrap":[46],"tree,":[47],"graph":[49],"how":[51],"nodes":[52,231],"have":[53,100],"joined":[54],"invitations.":[58],"Unlike":[59],"prior":[60,282],"Sybil-resistant":[61],"based":[64,210],"on":[65,72,211],"social":[66,79,108,269],"networks,":[67],"Persea":[68,113,216,262],"does":[69],"not":[70],"rely":[71],"two":[73],"key":[74],"assumptions:":[75],"(1)":[76],"network":[80,270],"is":[81,88,228,245],"fast":[82],"mixing":[83],"(2)":[85],"there":[87],"small":[90],"ratio":[91],"attack":[93],"edges":[94],"honest":[96],"nodes.":[97],"Both":[98],"assumptions":[99],"been":[101],"shown":[102],"be":[104,255],"unreliable":[105],"real":[107],"networks.":[109],"A":[110],"node":[111,122,128,131,136,143,164,173],"joins":[112],"when":[114],"it":[115,139,275],"gets":[116],"invitation":[118],"from":[119,257],"existing":[121],"The":[126,169,215],"inviting":[127],"assigns":[129],"ID":[132,152,187,201],"joining":[135],"gives":[138],"chunk":[141,150],"for":[145],"further":[146],"distribution.":[147],"For":[148],"each":[149,224],"space,":[153],"needs":[156],"socially":[158],"engineer":[159],"connection":[161],"another":[163],"already":[165],"hierarchical":[170,200],"distribution":[171],"confines":[175],"botnet":[179],"considerably":[182],"smaller":[183],"region":[184,244],"space":[188,202],"than":[189,281],"normal":[192],"then":[196],"build":[197],"upon":[198],"this":[199],"make":[204],"distributed":[206],"hash":[207],"table":[208],"(DHT)":[209],"Kad":[213],"network.":[214,238],"DHT":[217],"replication":[220],"mechanism":[221],"(key,":[225,251],"value)":[226],"pair":[227,253],"stored":[229],"evenly":[234],"spaced":[235],"over":[236],"Thus,":[239],"even":[240],"if":[241],"given":[243],"occupied":[246],"attackers,":[248],"desired":[250],"value":[252],"can":[254],"retrieved":[256],"other":[258],"regions.":[259],"evaluate":[261],"analysis":[264],"simulations":[267],"with":[268,284],"datasets":[271],"show":[273],"provides":[276],"better":[277],"lookup":[278],"success":[279],"rates":[280],"work":[283],"modest":[285],"overheads.":[286]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
