ID mapping attacks in P2P networks

Current P2P (overlay) networks have been designed with a focus on the construction of efficient mechanisms for the storage and retrieval of information among a community of participating nodes, with limited attention to the protection from malicious behaviours. The paper analyzes the attacks that can be realized on the choice of identifiers by the nodes and proposes adequate countermeasures. The paper uses as a reference the Kademlia protocol, but most of the results are immediately applicable to every DHT network.