Exploiting Internet Delay Space Properties for Sybil Attack Mitigation
dc.contributor.author | Ng, T. S. Eugene | en_US |
dc.contributor.author | Zhang, Bo | en_US |
dc.date.accessioned | 2017-08-02T22:03:05Z | en_US |
dc.date.available | 2017-08-02T22:03:05Z | en_US |
dc.date.issued | 2008-06-02 | en_US |
dc.date.note | June 2, 2008 | en_US |
dc.description.abstract | Recent studies have discovered that the Internet delay space has many interesting properties such as triangle inequality violations (TIV), clustering structures, and constrained growth. Understanding these properties has so far benefited the design of network models and network-performance-aware systems. In this paper, we consider an interesting, previously unexplored connection between Internet delay space properties and network locations. We show that this connection can be exploited to mitigate the Sybil attack problem in peer-to-peer systems. | en_US |
dc.format.extent | 10 pp | en_US |
dc.identifier.citation | Ng, T. S. Eugene and Zhang, Bo. "Exploiting Internet Delay Space Properties for Sybil Attack Mitigation." (2008) https://hdl.handle.net/1911/96365. | en_US |
dc.identifier.digital | TR08-02 | en_US |
dc.identifier.uri | https://hdl.handle.net/1911/96365 | en_US |
dc.language.iso | eng | en_US |
dc.rights | You are granted permission for the noncommercial reproduction, distribution, display, and performance of this technical report in any format, but this permission is only for a period of forty-five (45) days from the most recent time that you verified that this technical report is still available from the Computer Science Department of Rice University under terms that include this permission. All other rights are reserved by the author(s). | en_US |
dc.title | Exploiting Internet Delay Space Properties for Sybil Attack Mitigation | en_US |
dc.type | Technical report | en_US |
dc.type.dcmi | Text | en_US |
Files
Original bundle
1 - 1 of 1