Content deleted Content added
Randendavis (talk | contribs) m →History: Remove link to deleted article |
Correct misleading information since Whanau is a DHT specifically designed to resist Sybil attacks. |
||
Line 107:
</ref>
A DHT system that is carefully designed to have [[Byzantine fault tolerance]] can defend against a security weakness, known as the [[Sybil attack]], which affects
Maxwell Young; Aniket Kate; Ian Goldberg; Martin Karsten.
[http://www.cypherpunks.ca/~iang/pubs/robustMessagePassing.pdf "Practical Robust Communication in DHTs Tolerating a Byzantine Adversary"].
Line 114:
"Byzantine agreement for reputation management in DHT-based peer-to-peer networks".
{{doi|10.1109/ICTEL.2008.4652638}}
</ref> Whanau is a DHT designed to be resistant to Sybil attacks.<ref>
Whanau: A Sybil-proof Distributed Hash Table
https://pdos.csail.mit.edu/papers/whanau-nsdi10.pdf
</ref>
Petar Maymounkov, one of the original authors of [[Kademlia]], has proposed a way to circumvent the weakness to the Sybil attack by incorporating social trust relationships into the system design.<ref>{{cite journal |author=Chris Lesniewski-Laas |title=A Sybil-proof one-hop DHT |pages=20 |url=http://pdos.csail.mit.edu/papers/sybil-dht-socialnets08.pdf }}</ref> The new system, codenamed Tonika or also known by its ___domain name as 5ttt, is based on an algorithm design known as "electric routing" and co-authored with the mathematician Jonathan Kelner.<ref>{{cite journal |author=Jonathan Kelner, Petar Maymounkov |title=Electric routing and concurrent flow cutting |url=https://archive.org/details/arxiv-0909.2859 |arxiv=0909.2859|bibcode=2009arXiv0909.2859K|year=2009 }}</ref> Maymounkov has now undertaken a comprehensive implementation effort of this new system. However, research into effective defences against Sybil attacks is generally considered an open question, and wide variety of potential defences are proposed every year in top security research conferences.{{Citation needed|date=May 2020}}
|