Simulations of Sybil Attacks on Identity-Augmented Proof-of-Stake

Published: 29 June 2021| Version 2 | DOI: 10.17632/3g8s2g69b3.2
Moritz Platt


This data set contains two types of outputs: 1. Outputs of simulations of the IdAPoS protocol under mitigated ‘Sybil’ attacks. The data is stored in tab-separated value format. For each of the mitigation strategies, a dedicated file is available. Within these files, the first column denotes the step of the simulation, the second column denotes the type of message (issuance, endorsement, or discouragement), the third column denotes whether the sender is an honest or a malicious agent, the fourth and fifth column denote the sender and target addresses and the last column denotes the nominal value, in case of issuance transactions. 2. A calculation of the effectiveness of the strategies tested measured as the sum of market values of tokens that participants hold.



King's College London


Computer Simulation, Agent-Based Modeling