Byzantine Fault Tolerance of Inverse de Bruijn Overlay Networks for Secure P2P Routing

نویسندگان

  • Ying Chen
  • Kai Hwang
چکیده

Byzantine faults in a peer-to-peer (P2P) system are resulted from adversarial and inconsistent peer behaviors. Malicious peers can disrupt the routing functions in peer joining and lookup services. Byzantine attackers may collude with each other to paralyze the entire P2P network operations. We discover a new class of DHT-based overlay networks, called inverse de Bruijn (IDB) graph, to enable multi-path P2P routing. The IDB overlays provide multiple entry points and multiple routes between node pair. These features enable secure routing services in O(logk n) time with O(k logkn) lookup messages and O(klogk n) joining messages, where the graph index k ≥ 2 and the full overlay has n=k nodes. For large index k >> 2, the IDB overlays handle random and Byzantine faults effectively, far beyond the capability of Chord or CAN. The IDB overlays establish a Byzantine fault tolerance (BFT) framework, by which secure P2P routing is guaranteed by using multiple routes to bypass faulty route. New BFT routing algorithms are developed for secure joining and lookup operations. Consequently, fault tolerance is achieved by majority vote on data returned from multiple routes. The paper presents graph-theoretic properties of sparse IDB overlay networks and the protocols needed to establish the BFT. Experimental results are reported on simulated IDB and Chord overlays. Both theoretical and experimental results support the claimed BFT advantages. The performance gain is obtained with small increase in messaging overhead. In summary, the IDB overlays are ideal to cope with peer collusions or Byzantine attacks in DHT-based P2P systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Overlay network mechanisms for Peer-to-Peer systems

The Peer-to-Peer (P2P) paradigm provides an alternative design approach for distributed systems, which relaxes the requirement for dedicated service providers as it is the case in client-server systems. The P2P approach explores the potential to create distributed systems based on the resources and the services that can be provided by any end-point device connected to a common communication med...

متن کامل

A Robust Byzantine Fault-Tolerant Replication Technique for Peer-to-Peer Content Distribution

Problem statement: In peer-to-peer networks, Byzantine fault tolerance refers to the capability of a system to tolerate Byzantine faults. It can be achieved by replicating the server and by ensuring all server replicas reach an agreement on the input despite Byzantine faulty replicas and clients. Since malicious attacks and software errors can cause faulty nodes to exhibit Byzantine behavior, B...

متن کامل

On de Bruijn routing in distributed hash tables: There and back again∗ EPFL Technical Report: IC/2004/41

We show in this paper that de Bruijn networks, despite providing efficient search while using constant routing table size, as well as simplicity of the understanding and implementation of such networks, are unsuitable where key distribution will be uneven, a realistic scenario for most practical applications. In presence of arbitrarily skewed data distribution, it has only recently been shown t...

متن کامل

STONe: Secure Trusted Overlay Networks for Robust Privacy-Protecting Communication

This paper presents STONe, Secure Trusted Overlay Network, a novel robust network infrastructure that provides privacypreserving communication. STONe is the first network architecture based on attestation and strong process isolation in Trusted Computing. Using these features to protect the network stack against Byzantine failures, STONe is able to establish different protection techniques agai...

متن کامل

Design of Saturn Architecture Over DHT Data System

A large-scale network is one in which the automated network systems must be able to manage the network as a single entity rather than managing individual connections between networks. A large scale network consists of an overall architecture. An overlay architecture is used to improve internet routing and quality of service guarantees to achieve higher quality streaming media. The existing over...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006