Secure forwarding in DHTs - Is redundancy the key to robustness?

5Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The provisioning of techniques for secure message forwarding over Distributed Hash Tables has been a research concern for a long time. Several techniques have been developed and evaluated, but typically each based on the increase of redundancy as a defense against data forwarding attacks. Although the security vigor of these solutions, they have left the scalability aspect largely unaddressed, as the weak peers may not support the congestion caused by the increase on redundancy. In this article, we take the opposite tack and discuss why improving the quality of delivery paths can achieve a resilience comparable to redundant routing. To prove our intuition, we confront the two strategies and develop a representative algorithm of each category. Further, we validate our work using two other existing protocols that increase redundancy (more independent paths) to fortify routing. Our results reveal that improving the quality of paths can be as effective as increasing redundancy but with minimum overhead. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Sànchez-Artigas, M., García-López, P., & Skarmeta, A. G. (2008). Secure forwarding in DHTs - Is redundancy the key to robustness? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5168 LNCS, pp. 611–621). https://doi.org/10.1007/978-3-540-85451-7_65

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free