skip to main content
10.1145/1529282.1529292acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Secure routing in peer-to-peer distributed hash tables

Published: 08 March 2009 Publication History

Abstract

Distributed hash tables (DHTs) provide efficient and scalable lookup mechanisms for locating data in peer-to-peer (p2p) networks. Several issues, however, prevent DHT-based p2p networks from being widely deployed -- one of which is security. Malicious peers may modify, drop, misroute lookup requests, or even collude to deny the availability of target data. To address these security concerns, we propose an extension to Chord named Sechord. The main idea is that the source can determine whether the next hop is valid or invalid by estimating how far the next hop is from its finger pointer. If the next hop is too far away from the finger pointer, especially compared to the average distance between two consecutive peers, the source can infer some ongoing malicious activities. Our modifications require no trust between two nodes except node join. Moreover, each node utilizes locally available information to evaluate hops encountered during the lookup routing process for validity. These modifications have been implemented and evaluated in the presence of malicious nodes. Our results show that Sechord significantly enhances the security of structured p2p systems at the expense of slightly increased hop count.

References

[1]
BitTorrent. http://www.bittorrent.com/.
[2]
Napster. http://www.napster.com.
[3]
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. Wallach. Secure Routing for Structured Peer-to-Peer Overlay Networks. In Proc. of USENIX OSDI, pages 299--314, December 2002.
[4]
T. Condie, V. Kacholia, S. Sankararaman, J. Hellerstein, and P. Maniatis. Induced Churn as Shelter from Routing Table Poisoning. In Proc. of NDSS, February 2006.
[5]
G. Danezis, C. Lesiewski-Laas, M. F. Kaashoek, and R. Anderson. Sybil-Resistant DHT Routing. In Proc. of the 10th European Symposium on Research in Computer Security, pages 305--318, September 2005.
[6]
J. Douceur. The Sybil Attack. In Proc. of IPTPS, pages 251--260, March 2002.
[7]
H. Johansen, A. Allavena, and R. van Renesse. ACM SIGOPS Operating Systems Review, 40: 3--13, October 2006.
[8]
P. Maniatis, T. Giuli, M. Roussopoulos, D. Rosenthal, and M. Baker. Impeding Attrition Attacks in P2P Systems. In Proc. of the ACM SIGOPS European Workshop, September 2004.
[9]
S. Nielson, S. Crosby, and D. Wallach. A Taxonomy of Rational Attacks. In Proc. of IPTPS, February 2005.
[10]
A. Singh, M. Castro, P. Druschel, and A. Rowstron. Defending against Eclipse Attacks on Overlay Networks. In Proc. of the ACM SIGOPS European Workshop, pages 115--120, September 2004.
[11]
A. Singh and L. Liu. Agyaat: Providing Mutually Anonymous Services over Structured P2P Networks. In Proc. of the 14th World Wide Web Conference, pages 422--431, May 2005.
[12]
E. Sit and R. Morris. Security Consideration for Peer-to-Peer Distributed Hash Tables. In Proc. of IPTPS, pages 261--269, March 2002.
[13]
M. Srivatsa, L. Xiong, and L. Liu. TrustGuard: Coutering Vulnerabilities in Reputation Management for Decentralized Overlay Networks. In Proc. of the 14th World Wide Web Conference, pages 422--431, May 2005.
[14]
I. Stoica, R. Morris, D. Liben-Nowell, D. Karger, M. Kaashoek, F. Dabek, and H. Balakrishnan. Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications. In Proc. of ACM SIGCOMM, pages 149--160, August 2001.
[15]
D. Wallach. A Survey of Peer-to-Peer Security Issues. In Proc. of the ACM International Symposium on Software Security (ISSS), June 2002.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '09: Proceedings of the 2009 ACM symposium on Applied Computing
March 2009
2347 pages
ISBN:9781605581668
DOI:10.1145/1529282
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 March 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. distributed hash tables
  2. peer-to-peer overlay networks
  3. routing
  4. security

Qualifiers

  • Research-article

Conference

SAC09
Sponsor:
SAC09: The 2009 ACM Symposium on Applied Computing
March 8, 2009 - March 12, 2008
Hawaii, Honolulu

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Secure data dissemination and routing in Internet of ThingsInternational Journal of Information Technology10.1007/s41870-024-01848-4Online publication date: 28-Apr-2024
  • (2019)Reasoning About Identifier SpacesIEEE Transactions on Software Engineering10.1109/TSE.2017.265505643:12(1144-1156)Online publication date: 1-Jan-2019
  • (2018)CSR: Classified Source Routing in Distributed NetworksIEEE Transactions on Cloud Computing10.1109/TCC.2015.24402426:2(464-477)Online publication date: 1-Apr-2018
  • (2014)Robust Overlay Routing in Structured, Location Aware Mobile Peer-to-Peer SystemsMobile and Ubiquitous Systems: Computing, Networking, and Services10.1007/978-3-319-11569-6_13(155-167)Online publication date: 28-Sep-2014
  • (2011)The Security Routing Based on Convergence Detected about Route in DHT2011 International Conference on Network Computing and Information Security10.1109/NCIS.2011.72(321-325)Online publication date: May-2011
  • (2010)Secure routing strategies in DHT-based systemsProceedings of the Third international conference on Data management in grid and peer-to-peer systems10.5555/1885229.1885237(62-74)Online publication date: 1-Sep-2010
  • (2010)Secure Routing Strategies in DHT-Based SystemsData Management in Grid and Peer-to-Peer Systems10.1007/978-3-642-15108-8_6(62-74)Online publication date: 2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media