Providing Efficient Secure DHTs Routing

It is quite difficult to provide a secure routing path in DHTs, since nodes in the routing path do not always behave according to pre-established routing protocols. To address this issue, we propose a secure protocol which consists of two phases: detecting malicious nodes and bypassing them. We present a novel efficient routing strategy called tracer routing to control routing progress, accompanied by a node-ID based signature scheme. Combine these two, the source of every query can verify each step and malicious nodes can be identified. We also present a scheme to create a secure path to bypass malicious nodes. With high probability, each query successfully reach the destination even if there is a large number of malicious nodes in the system. Simulation results show the superiority of our protocol in comparison with previous protocols.

[1]  Bruce Lowekamp,et al.  The design of a versatile, secure P2PSIP communications architecture for the public internet , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[2]  Eng Keong Lua,et al.  Embeddable Overlay Networks , 2007, 2007 12th IEEE Symposium on Computers and Communications.

[3]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[4]  Antonio F. Gómez-Skarmeta,et al.  A novel methodology for constructing secure multipath overlays , 2005, IEEE Internet Computing.

[5]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[6]  Christian Cachin On-Line Secret Sharing , 1995, IMACC.

[7]  Robert Tappan Morris,et al.  Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.

[8]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[9]  Dan S. Wallach,et al.  A Survey of Peer-to-Peer Security Issues , 2002, ISSS.

[10]  Ben Y. Zhao,et al.  An Infrastructure for Fault-tolerant Wide-area Location and Routing , 2001 .

[11]  Peter Druschel,et al.  Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .

[12]  Miguel Castro,et al.  Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.

[13]  Eng Keong Lua,et al.  Securing peer-to-peer overlay networks from Sybil Attack , 2007, 2007 International Symposium on Communications and Information Technologies.