Securing The Peers Against Sybil Attack Using Sybil Trust

Authors(3) :-Ponemaharani D, Siddique Ibrahim S. P., Kirubakaran R

The work is based on networking to predict a trust to establish Peer to peer (P2P) e-commerce Electronic commerce or ecommerce is a term for any type of business, or commercial transaction that involves the transfer of information through the Internet applications exist at the other end of the Internet with vulnerabilities to passive and active attacks. The attacks occur using interactions between the trading peers as a transaction takes place. In this paper propose a Sybil attack, an active attack, it means some data is missing in transferring the data from one place to another place this is called active attack. And passive attack means data is not missing in transferring the data from one place to another place this is called passive attack. a central authority control is used in existing system. In this proposed system two techniques we are using Sybil trust central authority control and Homogeneous configuration. In this approach, duplicated Sybil attack peers can be identified as the neighbor peers become familiar and hence more trusted to each other. Security and performance analysis shows that Sybil attack can be minimized by this proposed neighbor similarity trust. Each peer has an identity, which is either honest or Sybil.

Authors and Affiliations

Ponemaharani D
Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore, Tamilnadu, India
Siddique Ibrahim S. P.
Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore, Tamilnadu, India
Kirubakaran R
Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore, Tamilnadu, India

Peer to peer (P2P), Sybil attack, active attack, passive attack.

  1. Guojun Wang Et al.,"Neighbor  Similarity Trust against Sybil attack in P2P ECommerce"., vol.26, no. 3,pp. 824-833,Mar 2015.
  2. J.Douceur, “The sybil attack," in Proc. Revised Papers 1st Int. Workshop Peer-to-Peer Syst., 2002, pp. 251–260.
  3. B. Yu, C. Z. Xu, and B. Xiao, “Detecting Sybil attacks in VANETs,"J. Parallel Distrib. Comput., vol. 73, no. 3, pp. 746–756, Jun. 2013.
  4. S. D. Kamvar, M. T. Scholosser, and H. G. Molina, “The Eigen-Trust algorithm for reputation management in P2P networks," in Proc. 12th Int. World Wide Web, May 2003, pp. 640–651.
  5. H. Yu, M. Kaminsky, P.B. Gibbons, and A. Flaxman, “SybilGuard: Defending against Sybil attack via social networks," IEEE/ACM Trans. Netw., vol. 16, no. 3, pp. 576–589, Jun. 2008.
  6. F. Musau, G. Wang, and M. B. Abdullahi, “Group formation with neighbor similarity trust in P2P e-commerce," in Proc. IEEE Joint Conf. Trust, Security Privacy Comput. Commun., Nov. 2011, pp. 835–840.
  7. http://gnunet.org>node
  8. https://www.computer.org > csdl > uic-atc

Publication Details

Published in : Volume 2 | Issue 2 | March-April 2017
Date of Publication : 2017-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1071-1075
Manuscript Number : CSEIT1722350
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Ponemaharani D, Siddique Ibrahim S. P., Kirubakaran R, "Securing The Peers Against Sybil Attack Using Sybil Trust", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.1071-1075, March-April-2017. |          | BibTeX | RIS | CSV

Article Preview