Due to the inherent characteristics of peer-to-peer systems, one of the barriers to deploy applications over public networks is the different security levels that have to be provided. Peer-to-peer systems are vulnerable to several attacks. In particular, for routing attacks, an adversary attempts to mis-route or drop messages along the routing procedure or corrupt routing table entries, thus degrading the overall routing process. In this paper, we propose a taxonomy of solutions to the routing attack, identify new issues and shape future directions. © 2010 Springer-Verlag.
CITATION STYLE
Villanueva, R., Del Pilar Villamil, M., & Arnedo, M. (2010). Secure routing strategies in DHT-based systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6265 LNCS, pp. 62–74). https://doi.org/10.1007/978-3-642-15108-8_6
Mendeley helps you to discover research relevant for your work.