Security considerations for peer-to-peer distributed hash tables

148Citations
Citations of this article
122Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recent peer-to-peer research has focused on providing efficient hash lookup systems that can be used to build more complex systems. These systems have good properties when their algorithms are executed correctly but have not generally considered how to handle misbehaving nodes. This paper looks at what sorts of security problems are inherent in large peer-to-peer systems based on distributed hash lookup systems. We examine the types of problems that such systems might face, drawing examples from existing systems, and propose some design principles for detecting and preventing these problems.

Cite

CITATION STYLE

APA

Sit, E., & Morris, R. (2002). Security considerations for peer-to-peer distributed hash tables. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2429, pp. 261–269). Springer Verlag. https://doi.org/10.1007/3-540-45748-8_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free