DocumentCode :
449554
Title :
ID mapping attacks in P2P networks
Author :
Cerri, Davide ; Ghioni, Alessandro ; Paraboschi, Stefano ; Tiraboschi, Simone
Author_Institution :
CEFRIEL, Politecnico di Milano, Milan, Italy
Volume :
3
fYear :
2005
fDate :
28 Nov.-2 Dec. 2005
Abstract :
Current P2P (overlay) networks have been designed with a focus on the construction of efficient mechanisms for the storage and retrieval of information among a community of participating nodes, with limited attention to the protection from malicious behaviours. The paper analyzes the attacks that can be realized on the choice of identifiers by the nodes and proposes adequate countermeasures. The paper uses as a reference the Kademlia protocol, but most of the results are immediately applicable to every DHT network.
Keywords :
information retrieval; information storage; peer-to-peer computing; protocols; security of data; telecommunication security; DHT network; ID mapping attacks; Kademlia protocol; P2P networks; distributed hash table network; information retrieval; information storage; malicious behaviours; overlay networks; Binary trees; Extraterrestrial measurements; Indexing; Information retrieval; Intelligent networks; Position measurement; Protection; Protocols; Routing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Global Telecommunications Conference, 2005. GLOBECOM '05. IEEE
Print_ISBN :
0-7803-9414-3
Type :
conf
DOI :
10.1109/GLOCOM.2005.1577956
Filename :
1577956
Link To Document :
بازگشت