DocumentCode
114108
Title
Trust-based routing for Kademlia in a sybil scenario
Author
Pecori, Riccardo ; Veltri, Luca
Author_Institution
Dept. of Inf. Eng., Univ. of Parma, Parma, Italy
fYear
2014
fDate
17-19 Sept. 2014
Firstpage
279
Lastpage
283
Abstract
Withstanding multiple false identities, also known as a Sybil attack, is one of the main challenges in securing structured peer-to-peer networks. Poisoning routing tables through these identities may make the routing process, needed for storing and retrieving resources within a DHT (Distributed Hash Table), extremely difficult and time consuming. We investigate current possible countermeasures and propose a novel method for making the routing in a Kademlia-based network more secure through the use of a trust-based routing algorithm exploiting reputation techniques. Our solution provides a balanced mixing of correct routing and trusted routing showing promising results in thwarting a Sybil attack in a Kademlia network, also in comparison with similar methods.
Keywords
computer crime; computer network management; computer network security; peer-to-peer computing; telecommunication network routing; trusted computing; DHT; Kademlia network; Sybil attack; Sybil scenario; distributed hash table; false identities; reputation techniques; routing process; routing tables poisoning; structured peer-to-peer networks; trust-based routing algorithm; Algorithm design and analysis; Filling; Internet; Measurement; Peer-to-peer computing; Routing; Standards; Incorrect routing; Kademlia; Structured peer-to-peer networks; Sybil attack; Trust and reputation;
fLanguage
English
Publisher
ieee
Conference_Titel
Software, Telecommunications and Computer Networks (SoftCOM), 2014 22nd International Conference on
Conference_Location
Split
Type
conf
DOI
10.1109/SOFTCOM.2014.7039131
Filename
7039131
Link To Document