Affiliation:
1. Microsoft Research Ltd., Cambridge, UK
2. Rice University, Houston, TX
Abstract
Structured peer-to-peer overlay networks provide a substrate for the construction of large-scale, decentralized applications, including distributed storage, group communication, and content distribution. These overlays are highly resilient; they can route messages correctly even when a large fraction of the nodes crash or the network partitions. But current overlays are not secure; even a small fraction of malicious nodes can prevent correct message delivery throughout the overlay. This problem is particularly serious in open peer-to-peer systems, where many diverse, autonomous parties without preexisting trust relationships wish to pool their resources. This paper studies attacks aimed at preventing correct message delivery in structured peer-to-peer overlays and presents defenses to these attacks. We describe and evaluate techniques that allow nodes to join the overlay, to maintain routing state, and to forward messages securely in the presence of malicious nodes.
Publisher
Association for Computing Machinery (ACM)
Reference19 articles.
1. Lecture Notes in Computer Science;Bellare M.,1996
Cited by
87 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Sybil Attack Strikes Again: Denying Content Access in IPFS with a Single Computer;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. Secure data dissemination and routing in Internet of Things;International Journal of Information Technology;2024-04-28
3. DeScan: Censorship-resistant indexing and search for Web3;Future Generation Computer Systems;2024-03
4. SecDFS: A Secure and Decentralized File System;2023 IEEE 29th International Conference on Parallel and Distributed Systems (ICPADS);2023-12-17
5. Peer Clustering for the InterPlanetary File System;Proceedings of the 2nd ACM SIGCOMM Workshop on Future of Internet Routing & Addressing;2023-09-10