ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper The Secure Routing Mechanism for DHT-based Overlay Network
Cited 2 time in scopus Download 0 time Share share facebook twitter linkedin kakaostory
Authors
Hyeok Chan Kwon, Sun Kee Koh, Jae Hoon Nah, Jong Soo Jang
Issue Date
2008-02
Citation
International Conference on Advanced Communication Technology (ICACT) 2008, pp.1300-1303
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1109/ICACT.2008.4494002
Project Code
07MK1700, Development of P2P Network Security Technology based on Wired/Wireless IPv6 Network, Nah Jae Hoon
Abstract
For routing and lookup efficiency, DHT-based overlay network has been developed. The representative DHT-based overlay networks are Kad, Chord, Pastry and CAN. And Several applications such as file sharing, distributed storage system have been developed on the DHT-baed overlay network. But there exist several security attacks on the DHT-based overlay network: Peer ID attack, Attacks on message routing, Rapid join/leave attack, DoS arrack and so on. In this paper, we propose secure routing mechanism against message routing attacks for DHT-based overlay network. The proposed mechanism ensures that when a normal peer sends a lookup messages using a key, the messages delivered to the peer which is owner of the key with very high probability.
KSP Keywords
File sharing, Message routing, Routing and, Routing attacks, Security attacks, distributed storage systems, overlay network, routing mechanism, secure routing