Whanaungatanga: Sybil-proof routing with social networks

Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed hash table that is strongly resistant to the Sybil attack. This is the firs...

Full description

Bibliographic Details
Main Authors: Lesniewski-Laas, Chris, Kaashoek, M. Frans
Other Authors: Frans Kaashoek
Published: 2009
Subjects:
Online Access:http://hdl.handle.net/1721.1/46819
_version_ 1811095538203885568
author Lesniewski-Laas, Chris
Kaashoek, M. Frans
author2 Frans Kaashoek
author_facet Frans Kaashoek
Lesniewski-Laas, Chris
Kaashoek, M. Frans
author_sort Lesniewski-Laas, Chris
collection MIT
description Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed hash table that is strongly resistant to the Sybil attack. This is the first solution to this problem with sublinear run time and space usage. The protocol uses the social connections between users to build routing tables that enable Sybil-resistant distributed hash table lookups. With a social network of N well-connected honest nodes, the protocol can tolerate up to O(N/log N) "attack edges" (social links from honest users to phony identities). This means that an adversary has to fool a large fraction of the honest users before any lookups will fail. The protocol builds routing tables that contain O(N log^(3/2) N) entries per node. Lookups take O(1) time. Simulation results, using social network graphs from LiveJournal, Flickr, and YouTube, confirm the analytical results.
first_indexed 2024-09-23T16:19:07Z
id mit-1721.1/46819
institution Massachusetts Institute of Technology
last_indexed 2024-09-23T16:19:07Z
publishDate 2009
record_format dspace
spelling mit-1721.1/468192019-04-10T11:56:26Z Whanaungatanga: Sybil-proof routing with social networks Lesniewski-Laas, Chris Kaashoek, M. Frans Frans Kaashoek Parallel and Distributed Operating Systems dht security sybil overlay distributed hash table Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed hash table that is strongly resistant to the Sybil attack. This is the first solution to this problem with sublinear run time and space usage. The protocol uses the social connections between users to build routing tables that enable Sybil-resistant distributed hash table lookups. With a social network of N well-connected honest nodes, the protocol can tolerate up to O(N/log N) "attack edges" (social links from honest users to phony identities). This means that an adversary has to fool a large fraction of the honest users before any lookups will fail. The protocol builds routing tables that contain O(N log^(3/2) N) entries per node. Lookups take O(1) time. Simulation results, using social network graphs from LiveJournal, Flickr, and YouTube, confirm the analytical results. 2009-09-28T21:00:08Z 2009-09-28T21:00:08Z 2009-09-24 http://hdl.handle.net/1721.1/46819 MIT-CSAIL-TR-2009-045 Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported http://creativecommons.org/licenses/by-nc-nd/3.0/ 14 p. application/pdf application/postscript
spellingShingle dht
security
sybil
overlay
distributed hash table
Lesniewski-Laas, Chris
Kaashoek, M. Frans
Whanaungatanga: Sybil-proof routing with social networks
title Whanaungatanga: Sybil-proof routing with social networks
title_full Whanaungatanga: Sybil-proof routing with social networks
title_fullStr Whanaungatanga: Sybil-proof routing with social networks
title_full_unstemmed Whanaungatanga: Sybil-proof routing with social networks
title_short Whanaungatanga: Sybil-proof routing with social networks
title_sort whanaungatanga sybil proof routing with social networks
topic dht
security
sybil
overlay
distributed hash table
url http://hdl.handle.net/1721.1/46819
work_keys_str_mv AT lesniewskilaaschris whanaungatangasybilproofroutingwithsocialnetworks
AT kaashoekmfrans whanaungatangasybilproofroutingwithsocialnetworks