Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3674558.3675767acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicctaConference Proceedingsconference-collections
research-article

KeyChallenge: A Novel Sybil Attack Mitigation Technique Based on Cryptographic Key Generation

Published: 26 August 2024 Publication History

Abstract

A Sybil attack poses a significant threat in distributed networks, allowing a malicious entity to wield disproportionate influence by generating multiple identifiers. In this paper, we introduce KeyChallenge, a novel approach leveraging a public key generation process to address Sybil attacks, effectively serving as a robust proof-of-work mechanism. To achieve this, we define a range for each of the 64 alphanumeric characters in Elliptic Curve public keys. We demonstrate the impracticality of an attacker generating a public key that matches all character ranges set by the system. KeyChallenge represents a significant advancement in mitigating Sybil attacks and fortifying network security within distributed systems, offering a promising and practical solution that effectively combats malicious activities.

References

[1]
[1] Siamak Solat. "Novel Fault-Tolerant, Self-Configurable, Scalable, Secure, Decentralized, and High-Performance Distributed Database Replication Architecture Using Innovative Sharding to Enable the Use of BFT Consensus Mechanisms in Very Large-Scale Networks." PhD Dissertation, Université Paris Cité, 2023. Available online at: https://www.researchgate.net/publication/379148513_Novel_Fault-Tolerant_Self-Configurable_Scalable_Secure_Decentralized_and_High-Performance_Distributed_Database_Replication_Architecture_Using_Innovative_Sharding_to_Enable_the_Use_of_BFT_Consensus_Mec.
[2]
[2] Douceur, John R. "The sybil attack." International workshop on peer-to-peer systems. Springer, Berlin, Heidelberg, 2002.
[3]
[3] Dwork, Cynthia, and Moni Naor. "Pricing via processing or combatting junk mail." Annual international cryptology conference. Springer, Berlin, Heidelberg, 1992.
[4]
[4] Liu, Lintao, et al. "R-Chain: A Self-Maintained Reputation Management System in P2P Networks." ISCA PDCS. 2004.
[5]
[5] Kamvar, Sepandar D., Mario T. Schlosser, and Hector Garcia-Molina. "The eigentrust algorithm for reputation management in p2p networks." Proceedings of the 12th international conference on World Wide Web. 2003.
[6]
[6] Jakobsson, Markus, and Ari Juels. "Proofs of work and bread pudding protocols." Secure information networks. Springer, Boston, MA, 1999. 258-272.
[7]
[7] Back, Adam. Hashcash-a denial of service counter-measure. (2002).
[8]
[8] Nakamoto, Satoshi. Bitcoin: A peer-to-peer electronic cash system. Manubot, 2019.
[9]
[9] Yu, Haifeng, et al. "Sybilguard: defending against sybil attacks via social networks." Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications. 2006.
[10]
[10] Lesniewski-Laas, Christopher, and M. Frans Kaashoek. "Whanau: A sybil-proof distributed hash table." (2010).
[11]
[11] Johnson, Don, Alfred Menezes, and Scott Vanstone. "The elliptic curve digital signature algorithm (ECDSA)." International journal of information security 1.1 (2001): 36-63.
[12]
[12] Jansma, Nicholas, and Brandon Arrendondo. "Performance comparison of elliptic curve and rsa digital signatures." nicj. net/files (2004).
[13]
[13] Newton-Raphson Method. Garrett, Stephen. Introduction to actuarial and financial mathematical methods. Academic Press, 2015. Available online at: https://www.sciencedirect.com/topics/mathematics/newton-raphson-method
[14]
[14] Castro, Miguel. "Practical Byzantine fault tolerance." Ph.D. Dissertation. Massachusetts Institute of Technology. Laboratory for Computer Science. Cambridge, Massachusetts, USA. January 31, 2001. Available online at: https://pmg.csail.mit.edu/ castro/thesis.pdf
[15]
[15] Yin, Maofan, et al. "Hotstuff: Bft consensus with linearity and responsiveness." Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing. 2019.
[16]
[16] Recommended Parameters secp256k1. Standards for Efficient Cryptography. SEC 2: Recommended Elliptic Curve Domain Parameters. https://www.secg.org/sec2-v2.pdf#subsubsection.2.4.1
[17]
[17] Validation of Elliptic Curve Public Keys. Standards for Efficient Cryptography. SEC 1: Elliptic Curve Cryptography. https://www.secg.org/sec1-v2.pdf#subsubsection.3.2.2

Index Terms

  1. KeyChallenge: A Novel Sybil Attack Mitigation Technique Based on Cryptographic Key Generation

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ICCTA '24: Proceedings of the 2024 10th International Conference on Computer Technology Applications
        May 2024
        324 pages
        ISBN:9798400716386
        DOI:10.1145/3674558
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 26 August 2024

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Cryptographic key generation
        2. Proof-of-Work
        3. Sybil attack

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        ICCTA 2024

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 6
          Total Downloads
        • Downloads (Last 12 months)6
        • Downloads (Last 6 weeks)4
        Reflects downloads up to 13 Nov 2024

        Other Metrics

        Citations

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media