Making Chord robust to Byzantine attacks

40Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Chord is a distributed hash table (DHT) that requires only O(log n) links per node and performs searches with latency and message cost O(log n), where n is the number of peers in the network. Chord assumes all nodes behave according to protocol. We give a variant of Chord which is robust with high probability for any time period during which: 1) there are always at least z total peers in the network for some integer z; 2) there are never more than (1/4 - ε)z Byzantine peers in the network for a fixed ε > 0; and 3) the number of peer insertion and deletion events is no more than zk for some tunable parameter k. We assume there is an adversary controlling the Byzantine peers and that the IP-addresses of all the Byzantine peers and the locations where they join the network are carefully selected by this adversary. Our notion of robustness is rather strong in that we not only guarantee that searches can be performed but also that we can enforce any set of "proper behavior" such as contributing new material, etc. In comparison to Chord, the resources required by this new variant are only a polylogarithmic factor greater in communication, messaging, and linking costs. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Fiat, A., Saia, J., & Young, M. (2005). Making Chord robust to Byzantine attacks. In Lecture Notes in Computer Science (Vol. 3669, pp. 803–814). Springer Verlag. https://doi.org/10.1007/11561071_71

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free