Diseño e implementación de un nuevo método para mitigación de ataque sybil con blockchain

dc.contributor.advisorPava Diaz, Roberto
dc.contributor.authorLeguízamo Muñoz, Miguel
dc.contributor.orcidPava Diaz, Roberto [0000-0003-0440-892X]
dc.date.accessioned2025-05-20T15:31:48Z
dc.date.available2025-05-20T15:31:48Z
dc.date.created2025-04-21
dc.descriptionEn este documento se introduce un nuevo modelo de mitigación de ataque sybil diseñado para la tecnología blockchain, con el uso de oráculos y un sistema de reputación, el propósito es fortalecer la seguridad de las aplicaciones. Se realiza una revisión y análisis detallado de los sistemas de mitigación de ataque sybil existentes que funcionan con blockchain, también se analizan los sistemas diseñados para administrar la reputación en una red blockchain. El objetivo es comprender las limitaciones y vulnerabilidades presentes en estos sistemas, con el fin de desarrollar una solución que aborde de manera efectiva las necesidades identificadas en las plataformas evaluadas. Este enfoque busca proporcionar una mayor robustez y confiabilidad al nuevo sistema propuesto, aumentando los estándares de seguridad en el entorno de las aplicaciones descentralizadas.
dc.description.abstractThis paper presents a new Sybil attack mitigation model designed for blockchain technology, using oracles and a reputation system, with the goal of strengthening application security. A detailed review and analysis of existing Sybil attack mitigation systems powered by blockchain is provided, as well as systems designed to manage reputation on a red blockchain. The objective is to understand the limitations and vulnerabilities present in these systems, in order to develop a solution that effectively addresses the needs identified in the evaluated platforms. This approach seeks to provide greater robustness and reliability to the proposed new system, raising security standards in the decentralized application environment.
dc.format.mimetypepdf
dc.identifier.urihttp://hdl.handle.net/11349/95562
dc.relation.referencesM. R. Cando-Segovia and P. Medina-Chicaiza, “Prevención en ciberseguridad: enfocada a los procesos de infraestructura tecnológica,” 3C TIC: Cuadernos de desarrollo aplicados a las TIC, vol. 10, pp. 17– 41, 3 2021.
dc.relation.referencesB. Levine, C. Shields, and N. Margolin, “A survey of solutions to the sybil attack,” Technical Report of Univ of Massachussets Amherst, vol. 2006–052, 11 2005.
dc.relation.referencesM. Bianchini, M. Gori, and F. Scarselli, “Inside pagerank,” ACM Transactions on Internet Technology, vol. 5, pp. 92–128, 2 2005.
dc.relation.referencesA. Cheng and E. Friedman, “Sybilproof reputation mechanisms,” in Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, P2PECON ’05, (New York, NY, USA), p. 128–132, Association for Computing Machinery, 2005.
dc.relation.referencesR. Bhattacharjee and A. Goel, “Avoiding ballot stuffing in ebay-like reputation systems,” in Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, P2PECON ’05, (New York, NY, USA), p. 133–137, Association for Computing Machinery, 2005.
dc.relation.referencesS. Azam, M. Bibi, R. Riaz, S. S. Rizvi, and S. J. Kwon, “Collaborative learning based sybil attack detection in vehicular ad-hoc networks (vanets),” Sensors, vol. 22, 9 2022.
dc.relation.referencesZ. Hangxia, “Mitigating peer-to-peer botnets by sybil attacks,” in 2010 International Conference on Innovative Computing and Communication and 2010 Asia-Pacific Conference on Information Technology and Ocean Engineering, pp. 241–243, 2010.
dc.relation.referencesK. Zhang, X. Liang, R. Lu, and X. Shen, “Sybil attacks and their defenses in the internet of things,” IEEE Internet of Things Journal, vol. 1, pp. 372–383, 10 2014.
dc.relation.referencesP. P., “Review on the various sybil attack detection techniques in wireless sensor network,” International Journal of Computer Applications, vol. 164, pp. 40–45, 04 2017.
dc.relation.referencesK. Sharma, “Wireless sensor networks: An overview on its security threats article in,” International Journal of Computer Applications, 2010.
dc.relation.referencesM. Pawar and J. Agarwal, “A literature survey on security issues of wsn and different types of attacks in network.”
dc.relation.referencesR. Singh, J. Singh, and R. Singh, “A novel sybil attack detection technique for wireless sensor networks,” 2017.
dc.relation.referencesA. Adulaziz, Detecting Sybil Attack in Mobile Wireless Sensor Networks Using Observer Nodes. PhD thesis, Unitec Institute of Technology, 2019.
dc.relation.referencesR. Almesaeed and E. Al-Salem, “Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks,” Wireless Networks, vol. 28, pp. 1361–1374, 5 2022.
dc.relation.referencesMicrosoft, “Microsoft digital defense report 2023 (mddr) | microsoft security insider.”
dc.relation.referencesAmazon, “Amazon publica su nuevo ‘informe de protección de marca 2023‘.”
dc.relation.referencesMeta, “Informe de amenazas adversarias de meta, primer trimestre de 2023.”
dc.relation.referencesJ. B, “Nuevo ataque a la blockchain: por qué las plataformas cripto no son 100
dc.relation.referencesD. Klepper, “Meta cierra miles de cuentas falsas de facebook creadas para polarizar elecciones de 2024 en eeuu,” Los Angeles Times, 11 2023.
dc.relation.referencesJ. Clayton, “El oscuro mundo de las reseñas negativas en amazon,” BBC News Mundo, 9 2020.
dc.relation.referencesT. Guggenberger, V. Schlatt, J. Schmid, and N. Urbach, “A structured overview of attacks on blockchain systems,” 2021.
dc.relation.referencesH. Chen, M. Pendleton, L. Njilla, and S. Xu, “A survey on ethereum systems security: Vulnerabilities, attacks, and defenses,” ACM Comput. Surv., vol. 53, jun 2020.
dc.relation.referencesA. Kiayias, E. Koutsoupias, M. Kyropoulou, and Y. Tselekounis, “Blockchain mining games,” in Proceedings of the 2016 ACM Conference on Economics and Computation, EC ’16, (New York, NY, USA), p. 365–382, Association for Computing Machinery, 2016.
dc.relation.referencesM. Mittal, K. Kumar, and S. Behal, “Deep learning approaches for detecting ddos attacks: a systematic review,” 9 2023.
dc.relation.referencesK. Alieyan, M. M. Kadhum, M. Anbar, S. U. Rehman, and N. K. A. Alajmi, “An overview of ddos attacks based on dns,” in 2016 International Conference on Information and Communication Technology Convergence (ICTC), pp. 276–280, 2016.
dc.relation.referencesK. Raj, “Foundations of blockchain : the pathway to cryptocurrencies and decentralized blockchain applications.”
dc.relation.referencesI. Bashir, “Mastering blockchain : Distributed ledger technology, decentralization, and smart contracts explained, 2nd edition.”
dc.relation.referencesS. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system.”
dc.relation.referencesI. G. A. K. Gemeliarana and R. F. Sari, “Evaluation of proof of work (pow) blockchains security network on selfish mining; evaluation of proof of work (pow) blockchains security network on selfish mining,” 2018.
dc.relation.referencesA. G. E. Zurich, G. O. Karame, K. W. E. Zurich, E. Zurich, and H. R. E. Zurich, “On the security and performance of proof of work blockchains vasileios glykantzis srdjaˇn capkun.”
dc.relation.referencesI. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining is vulnerable,” Communications of the ACM, vol. 61, pp. 95–102, 7 2018.
dc.relation.referencesS. Yan, “Analysis on blockchain consensus mechanism based on proof of work and proof of stake,” in Proceedings - 2022 International Conference on Data Analytics, Computing and Artificial Intelligence, ICDACAI 2022, pp. 464–467, Institute of Electrical and Electronics Engineers Inc., 2022.
dc.relation.referencesS. King and S. Nadal, “Ppcoin: Peer-to-peer crypto-currency with proof-of-stake,” 2012.
dc.relation.referencesB. Ford and J. Strauss, “An offline foundation for online accountable pseudonyms,” in Proceedings of the 1st Workshop on Social Network Systems, SocialNets’08 - Affiliated with EuroSys 2008, pp. 31–36, Association for Computing Machinery, 2008.
dc.relation.referencesF. Tramèr, F. Zhang, H. Lin, J. P. Hubaux, A. Juels, and E. Shi, “Sealed-glass proofs: Using transparent enclaves to prove and sell knowledge,” in Proceedings - 2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017, pp. 19–34, Institute of Electrical and Electronics Engineers Inc., 6 2017.
dc.relation.referencesG. Oliva, A. E. Hassan, and Z. Jiang, “An exploratory study of smart contracts in the ethereum blockchain platform,” Empirical Software Engineering, vol. 25, 05 2020.
dc.relation.referencesS. Fahim, S. K. Rahman, and S. Mahmood, “Blockchain: A comparative study of consensus algorithms pow, pos, poa, pov,” International Journal of Mathematical Sciences and Computing, vol. 9, pp. 46–57, 8 2023.
dc.relation.referencesM. Kaur, M. Khan, S. Gupta, A. Noorwali, C. Chakraborty, and S. Pani, “Mbcp: Performance analysis of large scale mainstream blockchain consensus protocols,” IEEE Access, vol. 9, pp. 80931–80944, 2021. Funding Information: This work was supported by Umm Al-Qura University through the Deanship of Scientific Research under Grant 19-ENG-1-01-0015. Publisher Copyright: © 2013 IEEE.
dc.relation.referencesS.Wan, M. Li, G. Liu, and C.Wang, “Recent advances in consensus protocols for blockchain: a survey,” Wireless Networks, vol. 26, 11 2020.
dc.relation.referencesU. S. S. Aditya, R. Singh, P. K. Singh, and A. Kalla, “A survey on blockchain in robotics: Issues, opportunities, challenges and future directions,” Journal of Network and Computer Applications, vol. 196, 12 2021.
dc.relation.referencesP. Zhang, D. C. Schmidt, J. White, and A. Dubey, “Consensus mechanisms and information security technologies,” Advances in Computers, vol. 115, pp. 181–209, 1 2019.
dc.relation.referencesF. Zhang, E. Cecchetti, K. Croman, A. Juels, and E. Shi, “Town crier: An authenticated data feed for smart contracts,” IEEE Access, p. 270–282, 2016.
dc.relation.referencesA. Beniiche, “A study of blockchain oracles,” IEEE Access, 3 2020.
dc.relation.referencesH. Al-Breiki, M. H. U. Rehman, K. Salah, and D. Svetinovic, “Trustworthy blockchain oracles: Review, comparison, and open research challenges,” IEEE Access, vol. 8, pp. 85675–85685, 2020.
dc.relation.referencesR. A. Española, “Reputación.”
dc.relation.referencesH. H. Meza, Reputación online. Hernández Meza, Hemer. PhD thesis, Universidad de Buenos Aires, 2016.
dc.relation.referencesU. C. Cambra, “Psychosocial basis of the online reputation: A proposal for a model and a case study,” Estudios Sobre el Mensaje Periodistico, vol. 19, pp. 691–700, 2013.
dc.relation.referencesD. F. S. Peña, “Diseño de la arquitectura de un sistema de identidad digital basada en tecnología blockchain aplicada al registro Único de clientes del sector financiero,” 2019.
dc.relation.referencesM. Zloteanu, N. Harvey, D. Tuckett, and G. Livan, “Digital identity: The effect of trust and reputation information on user judgement in the sharing economy,” PLoS ONE, vol. 13, 12 2018.
dc.relation.referencesE. Ert, A. Fleischer, and N. Magen, “Trust and reputation in the sharing economy: The role of personal photos in airbnb,” Tourism Management, vol. 55, pp. 62–73, 8 2016.
dc.relation.referencesP. Resnick and R. Zeckhauser, “Trust among strangers in internet transactions: Empirical analysis of ebay’ s reputation system,” Advances in Applied Microeconomics, vol. 11, pp. 127–157, 2002.
dc.relation.referencesT. Teubner, “Thoughts on the sharing economy,” MCCSIS 2014, pp. 322–326, 3 2014.
dc.relation.referencesB. J. H. P. Z. Xiang and H. Kim, “Personal profile information as cues of credibility in online travel reviews,” Anatolia, vol. 25, pp. 13–23, 2014.
dc.relation.referencesY. Liu, J. Wang, Z. Yan, Z. Wan, and R. Jantti, “A survey on blockchain-based trust management for internet of things,” IEEE Internet of Things Journal, vol. 10, pp. 5898–5922, 4 2023.
dc.relation.referencesX. Li, P. Jiang, T. Chen, X. Luo, and Q.Wen, “A survey on the security of blockchain systems,” 2 2018.
dc.relation.referencesJ. AREITIO BERTOLIN, Seguridad de la información. Redes, informática y sistemas de información. Ediciones Paraninfo, S.A, 2008.
dc.relation.referencesA. Pousa, “Algoritmo de cifrado simétrico aes. aceleración de tiempo de cómputo sobre arquitecturas multicore,” 12 2011.
dc.relation.referencesJ. C. Mendoza, “Demostración de cifrado simétrico y asimétrico.”
dc.relation.referencesIdena, “Idena whitepaper | idena documentation.”
dc.relation.referencesKleros, “Proof of humanity - kleros.”
dc.relation.referencesC. Lesaege, F. Ast, and W. George, “Kleros,” 2019.
dc.relation.referencesBrightID, “Whitepaper brightid.”
dc.relation.referencesD. Siddarth, “Proof of personhood: A review who watches the watchmen? a review of subjective approaches for sybil-resistance in proof of personhood protocols.”
dc.relation.referencesW3C, “Decentralized identifiers (dids) v1.0 core architecture, data model, and representations.”
dc.relation.referencesW3C, “Verifiable credentials data model v2.0.”
dc.relation.referencesE. Barker, “Recommendation for key management:,” NIST Special Publication 800-57 Part 1 Revision 5, 5 2020.
dc.relation.referencesO. Dogan and H. Karacan, “A blockchain-based e-commerce reputation system built with verifiable credentials,” IEEE Access, vol. 11, pp. 47080–47097, 2023.
dc.relation.referencesA. Mohsenzadeh, A. Jalaly Bidgoly, and Y. Farjami, “A fair consensus model in blockchain based on computational reputation,” Expert Systems with Applications, vol. 204, p. 117578, 05 2022.
dc.relation.referencesOrange, “What orange does - orange.”
dc.relation.referencesDisco, “Welcome to disco - disco docs - outdated.”
dc.relation.referencesSemaphore, “What is semaphore? | semaphore.”
dc.relation.referencesWordlcoin, “Technical implementation | worldcoin whitepaper.”
dc.rights.accesoAbierto (Texto Completo)
dc.rights.accessrightsOpenAccess
dc.subjectAtaque Sybil
dc.subjectSistema de Reputación
dc.subjectBlockchain
dc.subjectHardhat
dc.subjectEthereum
dc.subject.keywordSybil Attack
dc.subject.keywordReputation System
dc.subject.keywordBlockchain
dc.subject.keywordHardhat
dc.subject.keywordEthereum
dc.subject.lembIngeniería Electrónica -- Tesis y disertaciones académicas
dc.subject.lembSeguridad en computadores
dc.subject.lembCifrado de datos (Informática)
dc.subject.lembCadenas de bloques (Bases de datos)
dc.subject.lembComercio electrónico -- Seguridad
dc.titleDiseño e implementación de un nuevo método para mitigación de ataque sybil con blockchain
dc.title.titleenglishDesign and implementation of a new method for sybil attack mitigation with blockchain
dc.typebachelorThesis
dc.type.degreeMonografía

Archivos

Bloque original

Mostrando 1 - 2 de 2
Cargando...
Miniatura
Nombre:
LeguizamoMuñozMiguelAngel2025.pdf
Tamaño:
3.47 MB
Formato:
Adobe Portable Document Format
No hay miniatura disponible
Nombre:
Licencia de uso y publicacion.pdf
Tamaño:
198.39 KB
Formato:
Adobe Portable Document Format

Bloque de licencias

Mostrando 1 - 1 de 1
No hay miniatura disponible
Nombre:
license.txt
Tamaño:
7 KB
Formato:
Item-specific license agreed upon to submission
Descripción: