This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
|
||||||||
|
Paper Details
Paper Title
NodeId Verification Method against Routing Table Poisoning Attack In Chord DHT
Authors
  Avinash Chaudhari,  Pradeep Gamit
Abstract
Structured P2P networks are growing very fast because of their scalability, efficiency and reliability. Chord is one of the popular DHTs which generate its NodeId by hashing the IP address of node. As there is no mechanism to verify whether the NodeId is generated correctly or not, malicious nodes can generate multiple NodeIds easily. So genuine node’s routing tables can be easily poisoned with fake NodeIds. In this paper we proposed the NodeId verification mechanism which will verify whether NodeId is generated correctly or not before updating the routing table entry. We will then analyse and compare the results of mitigation mechanism under attack.
Keywords- peer-to-peer, overlay network, distributed hash table, poisoning attack, Sybil attack.
Publication Details
Unique Identification Number - IJEDR1402142Page Number(s) - 2167-2172Pubished in - Volume 2 | Issue 2 | June 2014DOI (Digital Object Identifier) -    Publisher - IJEDR (ISSN - 2321-9939)
Cite this Article
  Avinash Chaudhari,  Pradeep Gamit,   "NodeId Verification Method against Routing Table Poisoning Attack In Chord DHT", International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.2, Issue 2, pp.2167-2172, June 2014, Available at :http://www.ijedr.org/papers/IJEDR1402142.pdf
Article Preview
|
|
||||||
|