Exploiting Internet Delay Space Properties for Sybil Attack Mitigation

dc.contributor.authorNg, T. S. Eugeneen_US
dc.contributor.authorZhang, Boen_US
dc.date.accessioned2017-08-02T22:03:05Zen_US
dc.date.available2017-08-02T22:03:05Zen_US
dc.date.issued2008-06-02en_US
dc.date.noteJune 2, 2008en_US
dc.description.abstractRecent studies have discovered that the Internet delay space has many interesting properties such as triangle inequality violations (TIV), clustering structures, and constrained growth. Understanding these properties has so far benefited the design of network models and network-performance-aware systems. In this paper, we consider an interesting, previously unexplored connection between Internet delay space properties and network locations. We show that this connection can be exploited to mitigate the Sybil attack problem in peer-to-peer systems.en_US
dc.format.extent10 ppen_US
dc.identifier.citationNg, T. S. Eugene and Zhang, Bo. "Exploiting Internet Delay Space Properties for Sybil Attack Mitigation." (2008) https://hdl.handle.net/1911/96365.en_US
dc.identifier.digitalTR08-02en_US
dc.identifier.urihttps://hdl.handle.net/1911/96365en_US
dc.language.isoengen_US
dc.rightsYou are granted permission for the noncommercial reproduction, distribution, display, and performance of this technical report in any format, but this permission is only for a period of forty-five (45) days from the most recent time that you verified that this technical report is still available from the Computer Science Department of Rice University under terms that include this permission. All other rights are reserved by the author(s).en_US
dc.titleExploiting Internet Delay Space Properties for Sybil Attack Mitigationen_US
dc.typeTechnical reporten_US
dc.type.dcmiTexten_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR08-02.pdf
Size:
768.9 KB
Format:
Adobe Portable Document Format