首页> 外文会议>ACM symposium on Applied Computing >Secure routing in peer-to-peer distributed hash tables
【24h】

Secure routing in peer-to-peer distributed hash tables

机译:对等分布式哈希表中的安全路由

获取原文
获取外文期刊封面目录资料

摘要

Distributed hash tables (DHTs) provide efficient and scalable lookup mechanisms for locating data in peer-to-peer (p2p) networks. Several issues, however, prevent DHT-based p2p networks from being widely deployed -- one of which is security. Malicious peers may modify, drop, misroute lookup requests, or even collude to deny the availability of target data. To address these security concerns, we propose an extension to Chord named Sechord. The main idea is that the source can determine whether the next hop is valid or invalid by estimating how far the next hop is from its finger pointer. If the next hop is too far away from the finger pointer, especially compared to the average distance between two consecutive peers, the source can infer some ongoing malicious activities. Our modifications require no trust between two nodes except node join. Moreover, each node utilizes locally available information to evaluate hops encountered during the lookup routing process for validity. Thesemodifications have been implemented and evaluated in the presence of malicious nodes. Our results show that Sechord significantly enhances the security of structured p2p systems at the expense of slightly increased hop count.
机译:分布式哈希表(DHT)提供了高效且可扩展的查找机制,用于在对等(p2p)网络中定位数据。但是,有几个问题阻止了基于DHT的p2p网络的广泛部署-其中之一是安全性。恶意对等节点可能会修改,丢弃,错误路由查找请求,甚至合谋拒绝目标数据的可用性。为了解决这些安全问题,我们建议将Chord扩展为Sechord。主要思想是,源可以通过估计下一跳距其手指指针的距离来确定下一跳是有效还是无效。如果下一跳距离手指指针太远,特别是与两个连续对等点之间的平均距离相比,则源可以推断出一些正在进行的恶意活动。我们的修改除节点联接外,不需要两个节点之间的信任。此外,每个节点利用本地可用信息来评估在查找路由过程中遇到的跃点的有效性。这些修改已在存在恶意节点的情况下实施和评估。我们的结果表明,Sechord以略微增加的跳数为代价,大大增强了结构化p2p系统的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号