Research Article

A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord

Figure 7

Comparison between standard Chord, the method employed by Koyanagi [32], the method employed by Kohnen [9], GeTrust [33], and S-Chord considering successful lookups versus sybils number. The considered malicious behavior is no response.