Title :
Trust-based routing for Kademlia in a sybil scenario
Author :
Pecori, Riccardo ; Veltri, Luca
Author_Institution :
Dept. of Inf. Eng., Univ. of Parma, Parma, Italy
Abstract :
Withstanding multiple false identities, also known as a Sybil attack, is one of the main challenges in securing structured peer-to-peer networks. Poisoning routing tables through these identities may make the routing process, needed for storing and retrieving resources within a DHT (Distributed Hash Table), extremely difficult and time consuming. We investigate current possible countermeasures and propose a novel method for making the routing in a Kademlia-based network more secure through the use of a trust-based routing algorithm exploiting reputation techniques. Our solution provides a balanced mixing of correct routing and trusted routing showing promising results in thwarting a Sybil attack in a Kademlia network, also in comparison with similar methods.
Keywords :
computer crime; computer network management; computer network security; peer-to-peer computing; telecommunication network routing; trusted computing; DHT; Kademlia network; Sybil attack; Sybil scenario; distributed hash table; false identities; reputation techniques; routing process; routing tables poisoning; structured peer-to-peer networks; trust-based routing algorithm; Algorithm design and analysis; Filling; Internet; Measurement; Peer-to-peer computing; Routing; Standards; Incorrect routing; Kademlia; Structured peer-to-peer networks; Sybil attack; Trust and reputation;
Conference_Titel :
Software, Telecommunications and Computer Networks (SoftCOM), 2014 22nd International Conference on
Conference_Location :
Split
DOI :
10.1109/SOFTCOM.2014.7039131