CR-Chord: Improving lookup availability in the presence of malicious DHT nodes
نویسندگان
چکیده
Distributed Hash Tables (DHTs) provide a useful key-to-value lookup service for many Internet applications. However, without additional mechanisms DHTs are vulnerable to attacks. In particular, previous research showed that Chord is not well resistant to malicious nodes that joined the DHT. We introduce the cyclic routing algorithm as an extension of Chord (CR-Chord). Using simulations we compare the lookup availability of Chord and CR-Chord. The results suggest that CR-Chord improves the lookup availability on the average by 1.4 times. When the number of malicious nodes is small, such as 5%, CR-Chord has almost twice lower lookup failure rate.
منابع مشابه
Availability for DHT-Based Overlay Networks with Unidirectional Routing
Distributed Hash Tables (DHTs) provide a formally defined structure for overlay networks to store and retrieve content. However, handling malicious nodes which intentionally disrupt the DHT’s functionality is still a research challenge. One particular problem which is the scope of this paper is providing availability of the DHT’s lookup service in the presence of attackers. We focus on DHTs wit...
متن کاملHalo: High-Assurance Locate for Distributed Hash Tables
We study the problem of reliably searching for resources in untrusted peer-to-peer networks, where a significant portion of the participating network nodes may act maliciously to subvert the search process. We present a new method called Halo for performing redundant searches over a distributed hash table (DHT) structure to achieve high integrity and availability levels without affecting the st...
متن کاملA New Variation of Chord with Novel Improvement on Lookup Locality
Distributed Hash Tables (DHT) are mechanisms used to locate data in P2P and Grid computing. Early DHT schemes, while providing lookups with optimal or near optimal efficiency at the overlay level, tend to neglect efficiency at the physical level. Although one may extend a DHT scheme by simply adding additional nodes in routing tables to provide extra locality choices, we note that there are int...
متن کاملOctopus: Anonymous and Secure DHT Lookup
Distributed Hash Table (DHT) lookup is a core technique in structured peer-to-peer (P2P) networks. Its decentralized nature introduces security and privacy vulnerabilities for applications built on top of them; we thus set out to design a lookup mechanism achieving both security and anonymity, heretofore an open problem. We first explore the essential anonymity vulnerabilities in DHT lookups, a...
متن کاملSecure Lookup without (Constrained) Flooding
We present a new protocol for secure routing in overlay networks. Our protocol exports the same functionality as regular decentralized lookup protocols [9, 10, 12, 14, 15]. Moreover, the existing routing protocols can be enriched with the security primitives we introduce. Recall that a routing protocol exports a lookup operation that, given a key in a virtual identifier space (the id space), lo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Networks
دوره 55 شماره
صفحات -
تاریخ انتشار 2011