Research Article
A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord
Figure 11
Successful GETs versus sybils number with standard Chord and S-Chord considering two different ways of performing the lookup and variable ratio () between PUTs and GETs. The malicious behavior consists into accepting all PUTs and into refusing to answer to a retrieval request.