TY - JOUR
T1 - A Survey of DHT Security Techniques
AU - Urdaneta Paredes, G.A.
AU - Pierre, G.E.O.
AU - van Steen, M.R.
PY - 2011
Y1 - 2011
N2 - Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been shown to be notoriously difficult to protect against security attacks. Various reports have been published that discuss or classify general security issues, but so far a comprehensive survey describing the various proposed defenses has been lacking. In this article, we present an overview of techniques reported in the literature for making DHT-based systems resistant to the three most important attacks that can be launched by malicious nodes participating in the DHT: (1) the Sybil attack, (2) the Eclipse attack, and (3) routing and storage attacks. We review the advantages and disadvantages of the proposed solutions and, in doing so, confirm how difficult it is to secure DHT-based systems in an adversarial environment. © 2011 ACM.
AB - Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been shown to be notoriously difficult to protect against security attacks. Various reports have been published that discuss or classify general security issues, but so far a comprehensive survey describing the various proposed defenses has been lacking. In this article, we present an overview of techniques reported in the literature for making DHT-based systems resistant to the three most important attacks that can be launched by malicious nodes participating in the DHT: (1) the Sybil attack, (2) the Eclipse attack, and (3) routing and storage attacks. We review the advantages and disadvantages of the proposed solutions and, in doing so, confirm how difficult it is to secure DHT-based systems in an adversarial environment. © 2011 ACM.
UR - https://www.scopus.com/pages/publications/79551699813
UR - https://www.scopus.com/inward/citedby.url?scp=79551699813&partnerID=8YFLogxK
U2 - 10.1145/1883612.1883615
DO - 10.1145/1883612.1883615
M3 - Article
SN - 0360-0300
VL - 43
JO - ACM Computing Surveys
JF - ACM Computing Surveys
IS - 2
ER -