Research Article
A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord
Figure 6
Comparison of successful lookups versus sybils number for standard Chord and S-Chord for different values of . The considered malicious behavior is random response.