DocumentCode :
3018415
Title :
Providing Efficient Secure DHTs Routing
Author :
Xiang, Xu
Author_Institution :
Sch. of Comput. Eng., China Jiliang Univ., Hangzhou, China
Volume :
2
fYear :
2009
fDate :
11-14 Dec. 2009
Firstpage :
510
Lastpage :
514
Abstract :
It is quite difficult to provide a secure routing path in DHTs, since nodes in the routing path do not always behave according to pre-established routing protocols. To address this issue, we propose a secure protocol which consists of two phases: detecting malicious nodes and bypassing them. We present a novel efficient routing strategy called tracer routing to control routing progress, accompanied by a node-ID based signature scheme. Combine these two, the source of every query can verify each step and malicious nodes can be identified. We also present a scheme to create a secure path to bypass malicious nodes. With high probability, each query successfully reach the destination even if there is a large number of malicious nodes in the system. Simulation results show the superiority of our protocol in comparison with previous protocols.
Keywords :
cryptographic protocols; digital signatures; probability; routing protocols; telecommunication security; distributed hash table; malicious node bypassing; malicious node detection; node-ID based signature; probability; routing protocol; secure DHT routing; secure protocol; secure routing path; tracer routing; Abstracts; Bandwidth; Computational intelligence; Computer security; Concrete; Costs; Identity-based encryption; Peer to peer computing; Phase detection; Routing protocols; DHTs; Routing; Secure; Sybil attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Security, 2009. CIS '09. International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4244-5411-2
Type :
conf
DOI :
10.1109/CIS.2009.128
Filename :
5376173
Link To Document :
بازگشت