Avoiding eclipse attacks on kad/kademlia: an identity based approach

  • Authors:
  • Romano Fantacci;Leonardo Maccari;Matteo Rosi;Luigi Chisci;Luca Maria Aiello;Marco Milanesio

  • Affiliations:
  • Dipartimento di Elettronica e Telecomunicazioni, University of Florence;Dipartimento di Elettronica e Telecomunicazioni, University of Florence;Dipartimento di Elettronica e Telecomunicazioni, University of Florence;Dipartimento di Sistemi e Informatica, University of Florence;Dipartimento di Informatica, University of Turin;Dipartimento di Informatica, University of Turin

  • Venue:
  • ICC'09 Proceedings of the 2009 IEEE international conference on Communications
  • Year:
  • 2009
  • ID distribution in KAD

    CAR'10 Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 3

Quantified Score

Hi-index 0.00

Visualization

Abstract

Kademlia is a Distributed hash table widely used in P2P networks that has been applied to commercial and non commercial distribution of files. In this paper the authors review some security issues connected with Kademlia and a technique to leverage its security using an external certification service.