Exploiting Internet Delay Space Properties for Sybil Attack Mitigation

dc.contributor.authorNg, T. S. Eugene
dc.contributor.authorZhang, Bo
dc.date.accessioned2017-08-02T22:03:05Z
dc.date.available2017-08-02T22:03:05Z
dc.date.issued2008-06-02
dc.date.noteJune 2, 2008
dc.description.abstractRecent studies have discovered that the Internet delay space has many interesting properties such as triangle inequality violations (TIV), clustering structures, and constrained growth. Understanding these properties has so far benefited the design of network models and network-performance-aware systems. In this paper, we consider an interesting, previously unexplored connection between Internet delay space properties and network locations. We show that this connection can be exploited to mitigate the Sybil attack problem in peer-to-peer systems.
dc.format.extent10 pp
dc.identifier.citationNg, T. S. Eugene and Zhang, Bo. "Exploiting Internet Delay Space Properties for Sybil Attack Mitigation." (2008) https://hdl.handle.net/1911/96365.
dc.identifier.digitalTR08-02
dc.identifier.urihttps://hdl.handle.net/1911/96365
dc.language.isoeng
dc.rightsYou are granted permission for the noncommercial reproduction, distribution, display, and performance of this technical report in any format, but this permission is only for a period of forty-five (45) days from the most recent time that you verified that this technical report is still available from the Computer Science Department of Rice University under terms that include this permission. All other rights are reserved by the author(s).
dc.titleExploiting Internet Delay Space Properties for Sybil Attack Mitigation
dc.typeTechnical report
dc.type.dcmiText
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR08-02.pdf
Size:
768.9 KB
Format:
Adobe Portable Document Format