DocumentCode :
2842563
Title :
Bypass: Providing secure DHT routing through bypassing malicious peers
Author :
Sánchez-Artigas, Marc ; López, Pedro García ; Skarmeta, Antonio F Gómez
Author_Institution :
Univ. Rovira i Virgili, Tarragona
fYear :
2008
fDate :
6-9 July 2008
Firstpage :
934
Lastpage :
941
Abstract :
Much research has been devoted to the development of efficient distributed hash tables (DHTs). While many works have studied DHT systems, few have examined their security issues. For example, chord and other DHT implementations rely on the cooperation of individual peers to route requests. Consequently, any malicious node can drop and misroute messages at will, censoring the access of honest peers to content. In this paper, we introduce bypass, a novel DHT routing protocol designed to mitigate routing attacks. A key distinguishing feature of bypass from other implementations is a feedback-based filtering protocol that allows peers to avoid adversarial nodes when routing to the correct holders of a key. Our experimental results show that in principle bypass can achieve a lookup success rate close to theoretical bounds.
Keywords :
cryptography; feedback; peer-to-peer computing; routing protocols; Bypass; distributed hash tables; feedback; filtering protocol; malicious peers; routing protocol; Access protocols; Costs; Filtering; Filters; Indexing; Peer to peer computing; Routing protocols; Security; Sockets; Testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computers and Communications, 2008. ISCC 2008. IEEE Symposium on
Conference_Location :
Marrakech
ISSN :
1530-1346
Print_ISBN :
978-1-4244-2702-4
Electronic_ISBN :
1530-1346
Type :
conf
DOI :
10.1109/ISCC.2008.4625618
Filename :
4625618
Link To Document :
بازگشت