Withstanding multiple false identities, also known as a Sybil attack, is one of the main challenges in securing structured peer-to-peer networks. Poisoning routing tables through these identities may make the routing process, needed for storing and retrieving resources within a DHT (Distributed Hash Table), extremely difficult and time consuming. We investigate current possible countermeasures and propose a novel method for making the routing in a Kademlia-based network more secure through the use of a trust-based routing algorithm exploiting reputation techniques. Our solution provides a balanced mixing of correct routing and trusted routing showing promising results in thwarting a Sybil attack in a Kademlia network, also in comparison with similar methods.

Trust-based Routing for Kademlia in a Sybil Scenario / Pecori, Riccardo; Veltri, Luca. - (2014), pp. 279-283. (Intervento presentato al convegno 22nd International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2014 tenutosi a Radisson Blu Resort Hotel, hrv nel 2014) [10.1109/SOFTCOM.2014.7039131].

Trust-based Routing for Kademlia in a Sybil Scenario

PECORI, Riccardo;VELTRI, Luca
2014-01-01

Abstract

Withstanding multiple false identities, also known as a Sybil attack, is one of the main challenges in securing structured peer-to-peer networks. Poisoning routing tables through these identities may make the routing process, needed for storing and retrieving resources within a DHT (Distributed Hash Table), extremely difficult and time consuming. We investigate current possible countermeasures and propose a novel method for making the routing in a Kademlia-based network more secure through the use of a trust-based routing algorithm exploiting reputation techniques. Our solution provides a balanced mixing of correct routing and trusted routing showing promising results in thwarting a Sybil attack in a Kademlia network, also in comparison with similar methods.
2014
9789532900521
9789532900521
Trust-based Routing for Kademlia in a Sybil Scenario / Pecori, Riccardo; Veltri, Luca. - (2014), pp. 279-283. (Intervento presentato al convegno 22nd International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2014 tenutosi a Radisson Blu Resort Hotel, hrv nel 2014) [10.1109/SOFTCOM.2014.7039131].
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11381/2800908
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 8
  • ???jsp.display-item.citation.isi??? 8
social impact