Title :
Analysis and optimization of routing trust values in a Kademlia-based Distributed Hash Table in a malicious environment
Author_Institution :
Comput. Networking Technol. Group, Univ. of Duisburg-Essen, Duisburg, Germany
Abstract :
Trust management in peer-to-peer (P2P) networks is a current topic. Most of the current work focuses on a “clean routing table”, aiming to keep it free from malicious nodes. We follow a different approach which can be characterized as “clean routing process”: All kinds of nodes may be contained in a node´s routing table. During the routing process, only trustworthy nodes shall be used for determining the next hop and finally for storing or retrieving content items. The trust values are stored in a distributed way and the ratings must be given and stored verifiably. In this paper, we present the results of implementing our trust concept into a Kademliabased Distributed Hash Table (DHT). We analyze the distribution of the routing trust values and introduce malicious nodes into the network. The results show that our concept is able to identify them precisely.
Keywords :
computer network security; content-based retrieval; cryptography; optimisation; peer-to-peer computing; telecommunication network routing; trusted computing; DHT; Kademlia-based distributed hash table; clean routing process; clean routing table; content items retrieval; content items storage; malicious environment; malicious nodes; node routing table; peer-to-peer networks; routing trust values; trust management; trustworthy nodes; Distribution functions; IP networks; Optimization; Peer to peer computing; Public key; Routing; DHT; Kademlia; peer-to-peer; security; trust;
Conference_Titel :
Future Internet Communications (BCFIC), 2012 2nd Baltic Congress on
Conference_Location :
Vilnius
Print_ISBN :
978-1-4673-1672-9
DOI :
10.1109/BCFIC.2012.6217954