Affiliation:
1. VU University, Amsterdam, The Netherlands
Abstract
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been shown to be notoriously difficult to protect against security attacks. Various reports have been published that discuss or classify general security issues, but so far a comprehensive survey describing the various proposed defenses has been lacking. In this article, we present an overview of techniques reported in the literature for making DHT-based systems resistant to the three most important attacks that can be launched by malicious nodes participating in the DHT: (1) the Sybil attack, (2) the Eclipse attack, and (3) routing and storage attacks. We review the advantages and disadvantages of the proposed solutions and, in doing so, confirm how difficult it is to secure DHT-based systems in an adversarial environment.
Funder
European Union Programme of High Level Scholarships for Latin America
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Theoretical Computer Science
Cited by
89 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Sybil Attack Strikes Again: Denying Content Access in IPFS with a Single Computer;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. DISC-NG: Robust Service Discovery in the Ethereum Global Network;2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P);2024-07-08
3. De-DSI;Proceedings of the 4th Workshop on Machine Learning and Systems;2024-04-22
4. Next-Generation Distributed Hash Tables;Proceedings of the on CoNEXT Student Workshop 2023;2023-12-05
5. Kadcast-NG: A Structured Broadcast Protocol for Blockchain Networks;IEEE/ACM Transactions on Networking;2023-12