Opuh Jude Iwedike, OVILI Henry Peter, Nwachokor, Samuel Chukwuemeka, Adamugono Endurance, Daniel Ukpenusiowho, Oshiokpu Ijeoma Edith, ORUGBA KENNETH OBOKPARO, EKENO Precious Eroboghene
Abstract
The systematic study of relevant measures in extenuating Sybil attack by our developed, robust and fortified peer-to-peer system is a fundamental aim in this work. This work was designed to accommodate peer registration phase, ensuring peers satisfied communicated requirement as well as request for connection to the super peer. The coordinating agent module in the network reveal any malicious peer intention to connect with peers, certifying Super Peer dominance as well as no pairing for peer communication on the network. A peer restriction policy was incorporated in this study to guarantee systematic or automatic generation of a Communication Identity Code (CIC) on confirming successful peer registration and display error for peers trying to illegitimately connect on the network. The RSA cryptosystem as well as additional security layer. SHA3-1024 were utilized in assuring a robust and fortified system. The results of this study suggest as well as communicate a robust, reliable, better improvement and developed arrangement to handle Sybil attack in Peer-to-Peer system.
Keywords
Peer-to-peer, Communication Identity Code, RSA, Secure Hash Algorithm.
Conclusion
In this study, we tried to understand peer-to-peer network as well as the security challenges posed by Sybil menace in such system. We delved into Sybil attack pattern in such decentralized as well as unstructured system. The CIC strategic technique was utilized in extenuating numerous illegitimate identities connecting to the network. Our study incorporated SHA3 as additional security layer that proved to be infeasible for any adversary with malicious intention connecting to the network. Lastly, this system is robust and suggest a fortified arrangement in surmounting Sybil menace in peer-to-peer network.
References
1)Adeyinka,O.(2008). Internet Attack Methods and Internet Security Technology, Modeling and Simulation, AICMS .77-82, 13-15
2)Bertoni .G, J. Daemen, M. Peeters and G. Van Assche (2011). The KECCAK reference, Version 3.0, http://keccak.noekeon.org/Keccak-reference-3.0.
3)Charu V. (2012). A Comparison of Communication Protocols for Mobile Agents, International Journal of Advancements in Technology, 3. (2.).
4)Chen,J., H.Lu and S.Bruda (2010). A reputation-based approach for countering vulnerabilities in p2p networks, in: 2nd International Conference on E-Business and Information System Security, EBISS, 263 – 266.
5)Danezis, G., C. Lesniewski-Laas, M. Kaashoek and R. Anderson.(2005) . Sybil-resistant DH routing, in Proc. 10th European Symposium on Research in Comp. Sec.305–318.
6)Dasgupta, P. (2003). Improving Peer-to-Peer Resource Discovery Using Mobile Agent Based Referrals, Proceedings of the 2nd Workshop on Agent Enabled P2P Computing,. 41-54,
7)Douceur, J. (2002). The Sybil attack, in Proc. 1st Int. Workshop on Peerto-peer Sys. IPTPS, 251–260.
8)Gancheva, V., B. Shishedjiev and E.Kalcheva-Yovkova (2011). An approach to convert scientific data description, Intelligent Data Acquisition and Advanced Computing Systems, IEEE 6th International Conference, 15-17, 564-568,
9)Hutchins,E.M., M.J. Cloppert and R.M. Amin(2011) .Intelligence ‐Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains, in Proceeding of the 6th International Conference on Information Warfare and Security.
10)Juan, D and Q. Zheng (2012). The research on the XML-based information exchange under heterogeneous Environment in HR Outsourcing enterprises, Computer Science and Education, 7th International Conference, 14-17, .462-465.
11)Jung-Tae, K., P .Hae-Kyeong and P. Eui-Hyun (2003-2005), Security Issues in Peer-to-Peer Systems Electronics &Telecommunications Research Institute.
12)Kasyful. A (2017). Collaborative File Sharing System Using Jxta P2p Networking Infrastructure –AnApplication Development, Journal of Environmental Engineering & Sustainable Technology, 4 (1), 31-40.
13)Koubarakis, M. (2003). MultiAgent Systems and PeertoPeer Computing: Methods, Systems, and Challenges. Proc. CIA, Springer LNCS 2782. 46-61.
14)Marques, P., P. Simões., L. Silva, F. Boavida. And J. Silva (2001). Providing applications with mobile agent technology, Open Architectures and Network Programming Proceedings: 129 -136.
15)Opuh, J., Eke, B. & Williams, E.(2021). A Secured Agent-based Model for a Peer-to-Peer System, Computer Engineering and Intelligent System,, IISTE,12(2) 2222-2863.
16)Pang, X., B. Catania and K. Tan (2003). Securing your data in agent-based P2P systems. In Eighth International Conference
17)Rajesh.K, P.Suman and K.Vinod (2016). A Survey of Peer-to-Peer Networks, International Journal ofAdvanced Research in Computer and Communication Engineering.5, (4).
18)Riccardo, P. (2016). S-Kademlia: A trust and reputation method to mitigate a Sybil attack in Kademlia . Computer Networks, 94, 205-218.
19)Swamynathan, .G. K. Almeroth and B. Zhao (2010). The design of a reliable reputation system, Electronic Commerce Research 10 (4) 239 –70.
20)Vijayakumar, P., R. Naresh, D.Lazarus and I.Hafizul (2016).An efficient group key agreement protocol for secure P2P communication, Security and Communication Networks; 9:3952–3965.
21)William.S(2014). Computer Security, Third Edition http://williamstallings.com/ComputerSecurity
22)Xiao-Long.X , B. Nik and P.Norrington(2016). Hybrid Collaborative Management Ring on Mobile Multi-agent for Cloud-P2P, International Journal of Automation and Computing 13(6), 541-551.
Xu.Y, C. Deng and M. Gao (2012).The Topology of P2P Network, Journal of emerging trends in computing and information sciences. 3, 8, 2079-8407.
How to Cite This Paper
Opuh Jude Iwedike, OVILI Henry Peter, Nwachokor, Samuel Chukwuemeka, Adamugono Endurance, Daniel Ukpenusiowho, Oshiokpu Ijeoma Edith, ORUGBA KENNETH OBOKPARO, EKENO Precious Eroboghene (2026). A Robust and Systematic Strategy towards Extenuating Sybil Attack in a Peer-to-Peer Network. International Journal of Computer Techniques, 13(2). ISSN: 2394-2231.