Research Article

A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord

Figure 11

Successful GETs versus sybils number with standard Chord and S-Chord considering two different ways of performing the lookup and variable ratio () between PUTs and GETs. The malicious behavior consists into accepting all PUTs and into refusing to answer to a retrieval request.