• DocumentCode
    114108
  • Title

    Trust-based routing for Kademlia in a sybil scenario

  • Author

    Pecori, Riccardo ; Veltri, Luca

  • Author_Institution
    Dept. of Inf. Eng., Univ. of Parma, Parma, Italy
  • fYear
    2014
  • fDate
    17-19 Sept. 2014
  • Firstpage
    279
  • Lastpage
    283
  • Abstract
    Withstanding multiple false identities, also known as a Sybil attack, is one of the main challenges in securing structured peer-to-peer networks. Poisoning routing tables through these identities may make the routing process, needed for storing and retrieving resources within a DHT (Distributed Hash Table), extremely difficult and time consuming. We investigate current possible countermeasures and propose a novel method for making the routing in a Kademlia-based network more secure through the use of a trust-based routing algorithm exploiting reputation techniques. Our solution provides a balanced mixing of correct routing and trusted routing showing promising results in thwarting a Sybil attack in a Kademlia network, also in comparison with similar methods.
  • Keywords
    computer crime; computer network management; computer network security; peer-to-peer computing; telecommunication network routing; trusted computing; DHT; Kademlia network; Sybil attack; Sybil scenario; distributed hash table; false identities; reputation techniques; routing process; routing tables poisoning; structured peer-to-peer networks; trust-based routing algorithm; Algorithm design and analysis; Filling; Internet; Measurement; Peer-to-peer computing; Routing; Standards; Incorrect routing; Kademlia; Structured peer-to-peer networks; Sybil attack; Trust and reputation;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Software, Telecommunications and Computer Networks (SoftCOM), 2014 22nd International Conference on
  • Conference_Location
    Split
  • Type

    conf

  • DOI
    10.1109/SOFTCOM.2014.7039131
  • Filename
    7039131