Now showing 1 - 3 of 3
  • 2018Book Chapter
    [["dc.bibliographiccitation.firstpage","358"],["dc.bibliographiccitation.lastpage","374"],["dc.bibliographiccitation.volume","254"],["dc.contributor.author","Bochem, Arne"],["dc.contributor.author","Leiding, Benjamin"],["dc.contributor.author","Hogrefe, Dieter"],["dc.contributor.editor","Beyah, R."],["dc.contributor.editor","Chang, B."],["dc.contributor.editor","Li, Y."],["dc.contributor.editor","Zhu, S."],["dc.date.accessioned","2019-07-29T13:44:44Z"],["dc.date.available","2019-07-29T13:44:44Z"],["dc.date.issued","2018"],["dc.description.abstract","As mobile ad hoc networks (MANETs) and similar decentralized, self-organizing networks grow in number and popularity, they become worthwhile targets for attackers. Sybil attacks are a widespread issue for such networks and can be leveraged to increase the impact of other attacks, allowing attackers to threaten the integrity of the whole network. Authentication or identity management systems that prevent users from setting up arbitrary numbers of nodes are often missing in MANETs. As a result, attackers are able to introduce nodes with a multitude of identities into the network, thereby controlling a substantial fraction of the system and undermining its functionality and security. Additionally, MANETs are often partitioned and lack Internet access. As a result, implementing conventional measures based on central authorities is difficult. This paper fills the gap by introducing a decentralized blockchain-based identity system called Unchained. Unchained binds identities of nodes to addresses on a blockchain and economically disincentivizes the production of spurious identities by raising the costs of placing large numbers of Sybil identities in a network. Care is taken to ensure that circumventing Unchained results in costs similar or higher than following the protocol. We describe an offline verification scheme, detail the functionalities of the concept, discuss upper- and lower-bounds of security guarantees and evaluate Unchained based on case-studies."],["dc.identifier.doi","10.1007/978-3-030-01701-9_20"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/62150"],["dc.language.iso","en"],["dc.publisher","Springer"],["dc.publisher.place","Cham"],["dc.relation.crisseries","Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering"],["dc.relation.isbn","978-3-030-01700-2"],["dc.relation.isbn","978-3-030-01701-9"],["dc.relation.ispartof","Security and Privacy in Communication Networks"],["dc.relation.ispartofseries","Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;"],["dc.relation.issn","1867-8211"],["dc.relation.issn","1867-822X"],["dc.title","Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad Hoc Networks"],["dc.type","book_chapter"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]
    Details DOI
  • 2019Journal Article
    [["dc.bibliographiccitation.firstpage","253"],["dc.bibliographiccitation.journal","Computers & Security"],["dc.bibliographiccitation.lastpage","269"],["dc.bibliographiccitation.volume","86"],["dc.contributor.author","Norta, Alex"],["dc.contributor.author","Matulevičius, Raimundas"],["dc.contributor.author","Leiding, Benjamin"],["dc.date.accessioned","2019-07-30T12:41:17Z"],["dc.date.available","2019-07-30T12:41:17Z"],["dc.date.issued","2019"],["dc.identifier.doi","10.1016/j.cose.2019.05.017"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/62198"],["dc.language.iso","en"],["dc.relation.issn","0167-4048"],["dc.title","Safeguarding a formalized Blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]
    Details DOI
  • 2018Journal Article
    [["dc.bibliographiccitation.firstpage","1326"],["dc.bibliographiccitation.issue","6"],["dc.bibliographiccitation.journal","HMD Praxis der Wirtschaftsinformatik"],["dc.bibliographiccitation.lastpage","1340"],["dc.bibliographiccitation.volume","55"],["dc.contributor.author","Cap, Clemens H."],["dc.contributor.author","Leiding, Benjamin"],["dc.date.accessioned","2019-07-30T12:42:06Z"],["dc.date.available","2019-07-30T12:42:06Z"],["dc.date.issued","2018"],["dc.description.abstract","Wir stellen ein neues Konzept als Metamodell für das wissenschaftliche Publikationswesen vor. Unser Konzept ist im Kontext eines dreistufigen Phasenmodells digitaler Disruption von Geschäftsprozessen angesiedelt. Die erste Phase besteht dabei aus Technologie ohne Prozessanpassung. Die zweite Phase umfasst eine Prozessanpassung unter der Kontrolle von Intermediären und führt zu unerwünschter aber schwer vermeidbarer Zentralisierung. Die dritte Phase durchbricht schließlich die Vormachtstellung intermediärer Institutionen und nutzt dazu die disruptiven Möglichkeiten der Blockchain-Technologie."],["dc.identifier.doi","10.1365/s40702-018-00470-w"],["dc.identifier.purl","https://resolver.sub.uni-goettingen.de/purl?gs-1/15521"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/62199"],["dc.language.iso","en"],["dc.notes.intern","Merged from goescholar"],["dc.relation.issn","1436-3011"],["dc.relation.issn","2198-2775"],["dc.relation.orgunit","Fakultät für Mathematik und Informatik"],["dc.rights","CC BY 4.0"],["dc.rights.uri","https://creativecommons.org/licenses/by/4.0/"],["dc.title","Blogchain – Disruptives Publizieren auf der Blockchain"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dc.type.version","published_version"],["dspace.entity.type","Publication"]]
    Details DOI