ﻻ يوجد ملخص باللغة العربية
Some peers in the Bitcoin P2P network distributed a huge amount of spam IP addresses during July 2021. These spam IP addresses did not belong to actual Bitcoin peers. We found that the behavior of the spamming peers can be used to determine the number of neighbors of public peers and to find Sybil peers (peers that have multiple addresses). We evaluate the method by running an analysis based on data collected by our monitor nodes and compare the data to a ground-truth based on few peers that we run ourselves. The node degree of public peers is found with high precision and Sybil peers are correctly classified with very high precision and high recall if the spamming peers and the monitor are connected to all Sybil addresses.
The last mile connection is dominated by wireless links where heterogeneous nodes share the limited and already crowded electromagnetic spectrum. Current contention based decentralized wireless access system is reactive in nature to mitigate the inte
A population of voters must elect representatives among themselves to decide on a sequence of possibly unforeseen binary issues. Voters care only about the final decision, not the elected representatives. The disutility of a voter is proportional to
Blockchains are typically managed by peer-to-peer (P2P) networks providing the support and substrate to the so-called distributed ledger (DLT), a replicated, shared, and synchronized data structure, geographically spread across multiple nodes. The Bi
Centralized Virtual Private Networks (VPNs) when used in distributed systems have performance constraints as all traffic must traverse through a central server. In recent years, there has been a paradigm shift towards the use of P2P in VPNs to allevi
Given a large number of online services on the Internet, from time to time, people are still struggling to find out the services that they need. On the other hand, when there are considerable research and development on service discovery and service