Research Article

A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord

Figure 6

Comparison of successful lookups versus sybils number for standard Chord and S-Chord for different values of . The considered malicious behavior is random response.