DocumentCode
449554
Title
ID mapping attacks in P2P networks
Author
Cerri, Davide ; Ghioni, Alessandro ; Paraboschi, Stefano ; Tiraboschi, Simone
Author_Institution
CEFRIEL, Politecnico di Milano, Milan, Italy
Volume
3
fYear
2005
fDate
28 Nov.-2 Dec. 2005
Abstract
Current P2P (overlay) networks have been designed with a focus on the construction of efficient mechanisms for the storage and retrieval of information among a community of participating nodes, with limited attention to the protection from malicious behaviours. The paper analyzes the attacks that can be realized on the choice of identifiers by the nodes and proposes adequate countermeasures. The paper uses as a reference the Kademlia protocol, but most of the results are immediately applicable to every DHT network.
Keywords
information retrieval; information storage; peer-to-peer computing; protocols; security of data; telecommunication security; DHT network; ID mapping attacks; Kademlia protocol; P2P networks; distributed hash table network; information retrieval; information storage; malicious behaviours; overlay networks; Binary trees; Extraterrestrial measurements; Indexing; Information retrieval; Intelligent networks; Position measurement; Protection; Protocols; Routing;
fLanguage
English
Publisher
ieee
Conference_Titel
Global Telecommunications Conference, 2005. GLOBECOM '05. IEEE
Print_ISBN
0-7803-9414-3
Type
conf
DOI
10.1109/GLOCOM.2005.1577956
Filename
1577956
Link To Document