Identity-Augmented Proof-of-Stake Sybil Attack Simulation
The outputs of a simulation of the Identity-Augmented Proof-of-Stake protocol under a "Sybil" attack. The data is stored in tab-separated value format. For each of the mitigation strategies a dedicated file is available. Within these files, the first column denotes the step of the simulation, the second column denotes the type of message (issuance, endorsement or discouragement), the third column denotes whether the sender is a honest or a malicious agent, the fourth and fifths columns denote the sender and target addresses and the last column denotes the nominal value, in case of issuance transactions.