A Robust and Systematic Strategy towards Extenuating Sybil Attack in a Peer-to-Peer Network | IJCT Volume 13 – Issue 2 | IJCT-V13I2P117

International Journal of Computer Techniques
ISSN 2394-2231
Volume 13, Issue 2  |  Published: March – April 2026

Author

Opuh Jude Iwedike, OVILI Henry Peter, Nwachokor, Samuel Chukwuemeka, Adamugono Endurance, Daniel Ukpenusiowho, Oshiokpu Ijeoma Edith, ORUGBA KENNETH OBOKPARO, EKENO Precious Eroboghene

Abstract

The systematic study of relevant measures in extenuating Sybil attack by our developed, robust and fortified peer-to-peer system is a fundamental aim in this work. This work was designed to accommodate peer registration phase, ensuring peers satisfied communicated requirement as well as request for connection to the super peer. The coordinating agent module in the network reveal any malicious peer intention to connect with peers, certifying Super Peer dominance as well as no pairing for peer communication on the network. A peer restriction policy was incorporated in this study to guarantee systematic or automatic generation of a Communication Identity Code (CIC) on confirming successful peer registration and display error for peers trying to illegitimately connect on the network. The RSA cryptosystem as well as additional security layer. SHA3-1024 were utilized in assuring a robust and fortified system. The results of this study suggest as well as communicate a robust, reliable, better improvement and developed arrangement to handle Sybil attack in Peer-to-Peer system.

Keywords

Peer-to-peer, Communication Identity Code, RSA, Secure Hash Algorithm.

Conclusion

In this study, we tried to understand peer-to-peer network as well as the security challenges posed by Sybil menace in such system. We delved into Sybil attack pattern in such decentralized as well as unstructured system. The CIC strategic technique was utilized in extenuating numerous illegitimate identities connecting to the network. Our study incorporated SHA3 as additional security layer that proved to be infeasible for any adversary with malicious intention connecting to the network. Lastly, this system is robust and suggest a fortified arrangement in surmounting Sybil menace in peer-to-peer network.

References

1)Adeyinka,O.(2008). Internet Attack Methods and Internet Security Technology, Modeling and Simulation, AICMS .77-82, 13-15 2)Bertoni .G, J. Daemen, M. Peeters and G. Van Assche (2011). The KECCAK reference, Version 3.0, http://keccak.noekeon.org/Keccak-reference-3.0. 3)Charu V. (2012). A Comparison of Communication Protocols for Mobile Agents, International Journal of Advancements in Technology, 3. (2.). 4)Chen,J., H.Lu and S.Bruda (2010). A reputation-based approach for countering vulnerabilities in p2p networks, in: 2nd International Conference on E-Business and Information System Security, EBISS, 263 – 266. 5)Danezis, G., C. Lesniewski-Laas, M. Kaashoek and R. Anderson.(2005) . Sybil-resistant DH routing, in Proc. 10th European Symposium on Research in Comp. Sec.305–318. 6)Dasgupta, P. (2003). Improving Peer-to-Peer Resource Discovery Using Mobile Agent Based Referrals, Proceedings of the 2nd Workshop on Agent Enabled P2P Computing,. 41-54, 7)Douceur, J. (2002). The Sybil attack, in Proc. 1st Int. Workshop on Peerto-peer Sys. IPTPS, 251–260. 8)Gancheva, V., B. Shishedjiev and E.Kalcheva-Yovkova (2011). An approach to convert scientific data description, Intelligent Data Acquisition and Advanced Computing Systems, IEEE 6th International Conference, 15-17, 564-568, 9)Hutchins,E.M., M.J. Cloppert  and R.M. Amin(2011) .Intelligence ‐Driven  Computer  Network  Defense  Informed  by  Analysis  of Adversary  Campaigns  and  Intrusion  Kill  Chains,  in  Proceeding  of  the 6th  International  Conference  on  Information  Warfare  and  Security.   10)Juan, D and Q. Zheng (2012). The research on the XML-based information exchange under heterogeneous Environment in HR Outsourcing enterprises, Computer Science and Education, 7th International Conference, 14-17, .462-465. 11)Jung-Tae, K., P .Hae-Kyeong and P. Eui-Hyun (2003-2005), Security Issues in Peer-to-Peer Systems Electronics &Telecommunications Research Institute. 12)Kasyful. A (2017). Collaborative File Sharing System Using Jxta P2p Networking Infrastructure –AnApplication Development, Journal of Environmental Engineering & Sustainable Technology, 4 (1), 31-40. 13)Koubarakis, M. (2003). MultiAgent Systems and PeertoPeer Computing: Methods, Systems, and Challenges. Proc. CIA, Springer LNCS 2782. 46-61. 14)Marques, P., P. Simões., L. Silva, F. Boavida. And J. Silva (2001). Providing applications with mobile agent technology, Open Architectures and Network Programming Proceedings: 129 -136. 15)Opuh, J., Eke, B. & Williams, E.(2021). A Secured Agent-based Model for a Peer-to-Peer System, Computer Engineering and Intelligent System,, IISTE,12(2) 2222-2863. 16)Pang, X., B. Catania and K. Tan (2003). Securing your data in agent-based P2P systems. In Eighth International Conference 17)Rajesh.K, P.Suman and K.Vinod (2016). A Survey of Peer-to-Peer Networks, International Journal ofAdvanced Research in Computer and Communication Engineering.5, (4). 18)Riccardo, P. (2016). S-Kademlia: A trust and reputation method to mitigate a Sybil attack in Kademlia . Computer Networks, 94, 205-218. 19)Swamynathan, .G. K. Almeroth and B. Zhao (2010). The design of a reliable reputation system, Electronic Commerce Research 10 (4) 239 –70. 20)Vijayakumar, P., R. Naresh, D.Lazarus and I.Hafizul (2016).An efficient group key agreement protocol for secure P2P communication, Security and Communication Networks; 9:3952–3965. 21)William.S(2014). Computer Security, Third Edition http://williamstallings.com/ComputerSecurity 22)Xiao-Long.X , B. Nik and P.Norrington(2016). Hybrid Collaborative Management Ring on Mobile Multi-agent for Cloud-P2P, International Journal of Automation and Computing 13(6), 541-551. Xu.Y, C. Deng and M. Gao (2012).The Topology of P2P Network, Journal of emerging trends in computing and information sciences. 3, 8, 2079-8407.

How to Cite This Paper

Opuh Jude Iwedike, OVILI Henry Peter, Nwachokor, Samuel Chukwuemeka, Adamugono Endurance, Daniel Ukpenusiowho, Oshiokpu Ijeoma Edith, ORUGBA KENNETH OBOKPARO, EKENO Precious Eroboghene (2026). A Robust and Systematic Strategy towards Extenuating Sybil Attack in a Peer-to-Peer Network. International Journal of Computer Techniques, 13(2). ISSN: 2394-2231.

© 2026 International Journal of Computer Techniques (IJCT). All rights reserved.

Submit Your Paper