One promising way to defend against sybil attacks in social networks is to leverage the social network topologies. Decentralized algorithms, SybilGuard and SybilLimit to determine whether a suspect node is Sybil or not. SybilGuard and SybilLimit both rely on the assumption that social networks are fast mixing (explained later), and the number of attack edges […]