Availability for DHT-based overlay networks with unidirectional routing

  • Authors:
  • Jan Seedorf;Christian Muus

  • Affiliations:
  • NEC Laboratories Europe, Heidelberg, Germany;University of Hamburg, Hamburg, Germany

  • Venue:
  • WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Distributed Hash Tables (DHTs) provide a formally definedstructure for overlay networks to store and retrieve content. However,handling malicious nodes which intentionally disrupt the DHT's functionalityis still a research challenge. One particular problem - which isthe scope of this paper - is providing availability of the DHT's lookupservice in the presence of attackers. We focus on DHTs with unidirectionalrouting and present concrete algorithms to extend one particularsuch DHT, namely Chord. Our extensions provide independent multipathrouting and enable routing to replica roots despite attackers on theregular routing path. In addition, we investigate algorithms to detectadversary nodes which employ node-ID suppression attacks during routing.We demonstrate how these techniques can be combined to increaselookup success in a network under attack by deriving analytical boundsfor our proposed extensions and simulating how our algorithms comeclose to these bounds.