• DocumentCode
    449554
  • Title

    ID mapping attacks in P2P networks

  • Author

    Cerri, Davide ; Ghioni, Alessandro ; Paraboschi, Stefano ; Tiraboschi, Simone

  • Author_Institution
    CEFRIEL, Politecnico di Milano, Milan, Italy
  • Volume
    3
  • fYear
    2005
  • fDate
    28 Nov.-2 Dec. 2005
  • Abstract
    Current P2P (overlay) networks have been designed with a focus on the construction of efficient mechanisms for the storage and retrieval of information among a community of participating nodes, with limited attention to the protection from malicious behaviours. The paper analyzes the attacks that can be realized on the choice of identifiers by the nodes and proposes adequate countermeasures. The paper uses as a reference the Kademlia protocol, but most of the results are immediately applicable to every DHT network.
  • Keywords
    information retrieval; information storage; peer-to-peer computing; protocols; security of data; telecommunication security; DHT network; ID mapping attacks; Kademlia protocol; P2P networks; distributed hash table network; information retrieval; information storage; malicious behaviours; overlay networks; Binary trees; Extraterrestrial measurements; Indexing; Information retrieval; Intelligent networks; Position measurement; Protection; Protocols; Routing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Global Telecommunications Conference, 2005. GLOBECOM '05. IEEE
  • Print_ISBN
    0-7803-9414-3
  • Type

    conf

  • DOI
    10.1109/GLOCOM.2005.1577956
  • Filename
    1577956