@inproceedings{douceur2002the, author = {Douceur, John (JD)}, title = {The Sybil Attack}, booktitle = {Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS)}, year = {2002}, month = {January}, abstract = {Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these "Sybil attacks" is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.}, url = {http://approjects.co.za/?big=en-us/research/publication/the-sybil-attack/}, edition = {Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS)}, }