Sybil-resistant DHT routing

79Citations
Citations of this article
93Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Distributed Hash Tables (DHTs) are very efficient distributed systems for routing, but at the same time vulnerable to disruptive nodes. Designers of such systems want them used in open networks, where an adversary can perform a sybil attack by introducing a large number of corrupt nodes in the network, considerably degrading its performance. We introduce a routing strategy that alleviates some of the effects of such an attack by making sure that lookups are performed using a diverse set of nodes. This ensures that at least some of the nodes queried are good, and hence the search makes forward progress. This strategy makes use of latent social information present in the introduction graph of the network. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Danezis, G., Lesniewski-Laas, C., Kaashoek, M. F., & Anderson, R. (2005). Sybil-resistant DHT routing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3679 LNCS, pp. 305–318). https://doi.org/10.1007/11555827_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free