Research Article

A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord

Figure 15

Successful lookups versus sybils number in S-Chord and enhanced S-Chord featuring different spartaci in the network.