CR-Chord: Improving lookup availability in the presence of malicious DHT nodes

  • Authors:
  • B. Nechaev;D. Korzun;A. Gurtov

  • Affiliations:
  • Helsinki Institute for Information Technology - HIIT, Aalto University, P.O. Box 19800, 00076 Aalto, Finland;Helsinki Institute for Information Technology - HIIT, Aalto University, P.O. Box 19800, 00076 Aalto, Finland and Department of Computer Science, Petrozavodsk State University - PetrSU, Republic of ...;Helsinki Institute for Information Technology - HIIT, Aalto University, P.O. Box 19800, 00076 Aalto, Finland and Centre for Wireless Communications, University of Oulu, P.O. Box 4500, 90014 Oulu, ...

  • Venue:
  • Computer Networks: The International Journal of Computer and Telecommunications Networking
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Distributed Hash Tables (DHTs) provide a useful key-to-value lookup service for many Internet applications. However, without additional mechanisms DHTs are vulnerable to attacks. In particular, previous research showed that Chord is not well resistant to malicious nodes that joined the DHT. We introduce the cyclic routing algorithm as an extension of Chord (CR-Chord). Using simulations we compare the lookup availability of Chord and CR-Chord. The results suggest that CR-Chord improves the lookup availability on the average by 1.4 times. When the number of malicious nodes is small, such as 5%, CR-Chord has almost twice lower lookup failure rate.