A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord

A Sybil attack is one of the main challenges to be addressed when securing peer-to-peer networks, especially those based on Distributed Hash Tables (DHTs). Tampering routing tables by means of multiple fake identities can make routing, storing, and retrieving operations significantly more difficult and time-consuming. Countermeasures based on trust and reputation have already proven to be effective in some contexts, but one variant of the Sybil attack, the Spartacus attack, is emerging as a new threat and its effects are even riskier and more difficult to stymie. In this paper, we first improve a well-known and deployed DHT (Chord) through a solution mixing trust with standard operations, for facing a Sybil attack affecting either routing or storage and retrieval operations. This is done by maintaining the least possible overhead for peers. Moreover, we extend the solution we propose in order for it to be resilient also against a Spartacus attack, both for an iterative and for a recursive lookup procedure. Finally, we validate our findings by showing that the proposed techniques outperform other trust-based solutions already known in the literature as well.

[1]  Shin-Ming Cheng,et al.  On Designing Energy Efficient Wi-Fi P2P Connections for Internet of Things , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[2]  Prateek Mittal,et al.  X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks , 2012, NDSS.

[3]  Jie Liu,et al.  The Comparison of Distributed P2P Trust Models Based on Quantitative Parameters in the File Downloading Scenarios , 2016, J. Electr. Comput. Eng..

[4]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[5]  Michael Kohnen Applying trust and reputation mechanisms to a Kademlia-based Distributed Hash Table , 2012, 2012 IEEE International Conference on Communications (ICC).

[6]  Mahdi N. Al-Ameen,et al.  Persea: a sybil-resistant social DHT , 2013, CODASPY '13.

[7]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[8]  Leandros A. Maglaras,et al.  Vulnerability Analysis of Network Scanning on SCADA Systems , 2018, Secur. Commun. Networks.

[9]  Lei Shi,et al.  A modification on the Chord finger table for improving search efficiency , 2014, 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS).

[10]  Lim Tong Ming,et al.  Investigate SPRON Convergence Time Using Aggressive Chord and Aggressive AP-Chord , 2015, 2015 12th International Conference on Information Technology - New Generations.

[11]  Ashiq Anjum,et al.  Blockchain Standards for Compliance and Trust , 2017, IEEE Cloud Computing.

[12]  Raouf Boutaba,et al.  Reputation-Based Trust Management in Peer-to-Peer Systems: Taxonomy and Anatomy , 2010 .

[13]  Angelo Spognardi,et al.  DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation , 2018, Secur. Commun. Networks.

[14]  Pamela Zave,et al.  Reasoning About Identifier Spaces: How to Make Chord Correct , 2016, IEEE Transactions on Software Engineering.

[15]  Wei Zhang,et al.  Trustchord: chord protocol based on the trust management mechanism , 2010 .

[16]  M. Frans Kaashoek,et al.  Whanau: A Sybil-proof Distributed Hash Table , 2010, NSDI.

[17]  Kalman Graffi,et al.  Moving peers in distributed, location-based peer-to-peer overlays , 2017, 2017 International Conference on Computing, Networking and Communications (ICNC).

[18]  Xuemin Shen,et al.  Handbook of Peer-to-Peer Networking , 2009 .

[19]  Chi Zhang,et al.  TrueTop: A Sybil-Resilient System for User Influence Measurement on Twitter , 2015, IEEE/ACM Transactions on Networking.

[20]  Riccardo Pecori,et al.  S-Kademlia: A trust and reputation method to mitigate a Sybil attack in Kademlia , 2016, Comput. Networks.

[21]  Xiao Wang,et al.  VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils , 2016, IEEE Transactions on Dependable and Secure Computing.

[22]  Dongxu Liu,et al.  GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks , 2018, IEEE Transactions on Dependable and Secure Computing.

[23]  Rashmi Ranjan Rout,et al.  Trust-based decentralized service discovery in structured Peer-to-Peer networks , 2014, 2014 Annual IEEE India Conference (INDICON).

[24]  Riccardo Pecori A comparison analysis of trust-adaptive approaches to deliver signed public keys in P2P systems , 2015, 2015 7th International Conference on New Technologies, Mobility and Security (NTMS).

[25]  Takeshi Tsuchiya,et al.  A trust-based routing strategy in structured P2P overlay networks , 2013, The International Conference on Information Networking 2013 (ICOIN).

[26]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.

[27]  Osamu Takahashi,et al.  An Effective Lookup Strategy for Recursive and Iterative Lookup on Hierarchical DHT , 2012 .

[28]  Weisong Shi,et al.  PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[29]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[30]  Mohammad S. Obaidat,et al.  MR-Chord: Improved Chord Lookup Performance in Structured Mobile P2P Networks , 2015, IEEE Systems Journal.

[31]  Cheng Yang,et al.  Autonomous Gait Event Detection with Portable Single-Camera Gait Kinematics Analysis System , 2016, J. Sensors.

[32]  Xingwei Wang,et al.  A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks , 2016, Mob. Inf. Syst..

[33]  Mahdi Nasrullah Al-Ameen,et al.  iPersea: Towards improving the Sybil-resilience of social DHT , 2016, J. Netw. Comput. Appl..

[34]  Michael Kohnen Analysis and optimization of routing trust values in a Kademlia-based Distributed Hash Table in a malicious environment , 2012, 2012 2nd Baltic Congress on Future Internet Communications.

[35]  Keiichi Koyanagi,et al.  Study on trust-based maintenance of overlays in structured P2P systems , 2011, 2011 International Conference on Computational Problem-Solving (ICCP).

[36]  Luca Veltri,et al.  Trust-based routing for Kademlia in a sybil scenario , 2014, 2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM).

[37]  Michele Amoretti,et al.  Simulating mobile and distributed systems with DEUS and ns-3 , 2013, 2013 International Conference on High Performance Computing & Simulation (HPCS).

[38]  Guillermo Navarro-Arribas,et al.  Cryptocurrency Networks: A New P2P Paradigm , 2018, Mob. Inf. Syst..

[39]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[40]  Luca Veltri,et al.  3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications , 2016, Comput. Commun..

[41]  Xing Long Xie,et al.  Creditability assessment of dealers in P2P e-commerce , 2016, 2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC).

[42]  Thomas F. La Porta,et al.  Limiting Sybil Attacks in Structured P2P Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.