Research Article

A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord

Figure 2

Successful genuine, successful non-genuine, and unended lookups versus the number of sybils, whenever sybils respond with random IDs.