Consensus protocols can only deal with a limited amount of malicious nodes. Sybil control prevents the cheap introduction of a large number of malicious nodes, the basis for a sybil attack. Effective sybil control forces network participants to put real-world resources at stake. Like this, participants have “skin in the game” and are less likely to compromise the network’s integrity. The most common sybil control mechanisms for today’s blockchains are proof of work (PoW) and proof of stake (PoS).
List of Sybil Control Mechanisms
- Proof of Work (PoW): to validate blocks for the network, nodes have to solve hard mathematical problems in a competitive setting. The hardware and energy spendings necessary to “win” the block creation competition bind actors to the blockchain’s fate. This is the original sybil control mechanism for Bitcoin, established by Satoshi Nakamoto. Apart from the work costs, PoW adds security by its naturally random selection process of the winning block producer.
- Proof of Stake (PoS): block producer rights are assigned in proportion to a node’s holdings of the network’s native token. This mechanism binds block producers to the network’s value and ideally keeps them from acting against collective interest.
- Proof of Elapsed Time (POET): in a POET system, nodes go to sleep for a random amount of time. The first node to wake up obtains the right to produce the next block. POET systems have to ensure that nodes do indeed select a random sleep time, and that they do indeed wait for the said amount of time before waking up again.
- Proof of Space and Time (PoST): this sybil control mechanism asks block producers to provide a certain amount of storage space to the system as a proof of their engagement. Block production time is factored into the chain’s weight to prevent cheap storage attacks on the historical chain.
- Proof of Authority (PoA): here, the right to produce a block is assigned to a number of known nodes. This highly centralized approach is used for private blockchains, or during the startup phase of new public consensus mechanisms.
- Proof of Diversity (PoD): PoD uses IPV4 as a scarce resource limiting network participation.