Securing The Peers Against Sybil Attack Using Sybil Trust

Authors

  • Ponemaharani D  Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore, Tamilnadu, India
  • Siddique Ibrahim S. P.  Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore, Tamilnadu, India
  • Kirubakaran R  Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore, Tamilnadu, India

Keywords:

Peer to peer (P2P), Sybil attack, active attack, passive attack.

Abstract

The work is based on networking to predict a trust to establish Peer to peer (P2P) e-commerce Electronic commerce or ecommerce is a term for any type of business, or commercial transaction that involves the transfer of information through the Internet applications exist at the other end of the Internet with vulnerabilities to passive and active attacks. The attacks occur using interactions between the trading peers as a transaction takes place. In this paper propose a Sybil attack, an active attack, it means some data is missing in transferring the data from one place to another place this is called active attack. And passive attack means data is not missing in transferring the data from one place to another place this is called passive attack. a central authority control is used in existing system. In this proposed system two techniques we are using Sybil trust central authority control and Homogeneous configuration. In this approach, duplicated Sybil attack peers can be identified as the neighbor peers become familiar and hence more trusted to each other. Security and performance analysis shows that Sybil attack can be minimized by this proposed neighbor similarity trust. Each peer has an identity, which is either honest or Sybil.

References

  1. Guojun Wang Et al.,"Neighbor  Similarity Trust against Sybil attack in P2P ECommerce"., vol.26, no. 3,pp. 824-833,Mar 2015.
  2. J.Douceur, “The sybil attack," in Proc. Revised Papers 1st Int. Workshop Peer-to-Peer Syst., 2002, pp. 251–260.
  3. B. Yu, C. Z. Xu, and B. Xiao, “Detecting Sybil attacks in VANETs,"J. Parallel Distrib. Comput., vol. 73, no. 3, pp. 746–756, Jun. 2013.
  4. S. D. Kamvar, M. T. Scholosser, and H. G. Molina, “The Eigen-Trust algorithm for reputation management in P2P networks," in Proc. 12th Int. World Wide Web, May 2003, pp. 640–651.
  5. H. Yu, M. Kaminsky, P.B. Gibbons, and A. Flaxman, “SybilGuard: Defending against Sybil attack via social networks," IEEE/ACM Trans. Netw., vol. 16, no. 3, pp. 576–589, Jun. 2008.
  6. F. Musau, G. Wang, and M. B. Abdullahi, “Group formation with neighbor similarity trust in P2P e-commerce," in Proc. IEEE Joint Conf. Trust, Security Privacy Comput. Commun., Nov. 2011, pp. 835–840.
  7. http://gnunet.org>node
  8. https://www.computer.org > csdl > uic-atc

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
Ponemaharani D, Siddique Ibrahim S. P., Kirubakaran R, " Securing The Peers Against Sybil Attack Using Sybil Trust, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.1071-1075, March-April-2017.