首页 | 官方网站   微博 | 高级检索  
     

基于洗牌策略的Sybil攻击防御
引用本文:聂晓文,卢显良,唐晖,赵志军,李玉军.基于洗牌策略的Sybil攻击防御[J].电子学报,2008,36(11):2144-2149.
作者姓名:聂晓文  卢显良  唐晖  赵志军  李玉军
作者单位:1. 电子科技大学计算机学院,四川成都,610054
2. 中国科学院声学研究所,北京,100080
基金项目:国家发展改革委员会专项基金 , 中国下一代互联网示范工程课题  
摘    要: 洗牌策略从理论上解决了分布式哈希表(DHT)的Sybil攻击问题.为克服敌手作弊,引入受信节点构成分布式认证系统,由受信节点对新加入节点进行认证,保证节点签名和ID不能伪造;同时引入记录洗牌加入过程的票据来判定节点合法性,杜绝了敌手积累过期ID.由于保存票据的数量决定了论文提出算法的应用效果,通过理论分析和仿真实验证实设计的算法需要保存的票据数量不大,保证了算法的可行性.

关 键 词:Sybil攻击  洗牌策略  对等网  分布式哈希表(DHT)
收稿时间:2007-05-24

Resisting Sybil Attacks with Cards-Shuffling Scheme
NIE Xiao-wen,LU Xian-liang,TANG Hui,ZHAO Zhi-jun,LI Yu-jun.Resisting Sybil Attacks with Cards-Shuffling Scheme[J].Acta Electronica Sinica,2008,36(11):2144-2149.
Authors:NIE Xiao-wen  LU Xian-liang  TANG Hui  ZHAO Zhi-jun  LI Yu-jun
Affiliation:NIE Xiao-wen1,LU Xian-liang1,TANG Hui2,ZHAO Zhi-jun2,LI Yu-jun1 (1.School of Computer Science , Engineering,University of Electronic Science , Technology of China,Chengdu,Sichuan 610054,China,2.Institute of Acoustics,the Chinese Academy of Sciences,Beijing 100080,China)
Abstract:The Cards-Shuffling scheme solves the Sybil attack in distributed hash table(DHT) theoretically.To overcome cheats of the enemy,a distributed authentication system which constructed by trusted nodes is proposed.The joining nodes are authenticated by the trusted nodes to ensure that the sign and identifiers of the nodes can not be fabricated.Tickets recording the joining process of Cards-Shuffling scheme are also introduced to verify the nodes so that the accumulation of expired identifiers is impossible.The...
Keywords:Sybil attack  cards-shuffling scheme  peer-to-peer network  distributed hash table(DHT)  
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《电子学报》浏览原始摘要信息
点击此处可从《电子学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号