Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-031-42823-4_9guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Game-Based Approach for Mitigating the Sybil Attacks on Blockchain Applications

Published: 22 September 2023 Publication History

Abstract

The data explosion of this digital century encourages the necessity of data security and maintaining privacy. The generated data through online transactions in different sectors have been increased a million times. Therefore, the trustful transaction and reliability of data became necessary for its analysis and future use in the online platform. The change of data platform from a centralized to distributed nature enhances the utility of the data use, and the security threats are also increased side by side. The Sybil attack is one of the significant security threats in the distributed network environment. Blockchain is a peer-to-peer distributed ledger that works in a distributed environment. However, the blockchain framework, which aims to provide tamper-proof security on data suffers from Sybil attacks too. This paper aims to analyze the implementation of blockchain technology in different applications and propose a new game-based model to effectively detect and mitigate Sybil attacks on the blockchain.

References

[1]
Arifeen MM, Al Mamun A, Ahmed T, Kaiser MS, and Mahmud M A blockchain-based scheme for sybil attack detection in underwater wireless sensor networks Adv. Intell. Syst. Comput. 2021 1309 467-476
[2]
Bochem A and Leiding B Rechained: Sybil-resistant distributed identities for the internet of things and mobile ad hoc networks Sensors 2021 21 9 1-27
[3]
Platt M and McBurney P Sybil attacks on identity-augmented proof-of-stake Comput. Netw. 2021 199 108424
[4]
Rajab, T., Manshaei, M.H., Dakhilalian, M., Jadliwala, M., Rahman, M.A.: On the feasibility of sybil attacks in shard-based permission less blockchains (2020)
[5]
Wadii, J., Rim, H., Ridha, B.: Detecting and preventing Sybil attacks in wireless sensor networks. In: Mediterranean Microwave Symposium, vol. 2019, October 2019
[6]
Pecori R and Veltri L A balanced trust-based method to counter sybil and spartacus attacks in chord Secur. Commun. Netwo. 2018 2018 1-16
[7]
Swathi, P., Modi, C., Patel, D.: Preventing sybil attack in blockchain using distributed behavior monitoring of miners. In: 2019 10th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2019, pp. 1–6 (2019)
[8]
Begum A, Tareq AH, Sultana M, Sohel MK, Rahman T, and Sarwar AH Blockchain attacks, analysis and a model to solve double spending attack Int. J. Mach. Learn. Comput. 2020 10 2 352-357
[9]
Kumar B and Bhuyan B Game theoretical defense mechanism against reputation based sybil attacks Procedia Comput. Sci. 2020 167 2019 2465-2477
[10]
Shareh MB, Navidi H, Javadi HHS, and HosseinZadeh M Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model Inf. Sci. 2019 470 94-108

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
Computer Information Systems and Industrial Management: 22nd International Conference, CISIM 2023, Tokyo, Japan, September 22–24, 2023, Proceedings
Sep 2023
520 pages
ISBN:978-3-031-42822-7
DOI:10.1007/978-3-031-42823-4

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 22 September 2023

Author Tags

  1. Blockchain
  2. Smart Contract
  3. Sybil Attack
  4. Security Threats
  5. Game theory

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media