Research Article

A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord

Figure 10

Average number of hops per lookup with standard Chord and S-Chord algorithm when considering two different malicious behaviors.