Secure Routing in Structured P2P Overlay: Simulating Secure Routing on Chord DHT
Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Fully distributed systems offer the highest level of freedom for the users. For this reason, in today’s Internet, it is recorded that more than 50% of the packets moving in and out belong to this type of network. Huge networks of this kind are built on the top of DHTs, which follow a more structured communication compared to the other small peer-to-peer networks. Although nature always favors freedom and independ-ence, security issues force consumers to set up their network in a cen-trally controlled manner. One of security threats posed on such net-works is lookup attacks. A lookup attacks are kind of attacks which targets on disrupting the healthy routing process of the DHTs. Even though the freedom of peer-to-peer networks comes at the cost of securi-ty, it is quite attainable to make the network more secure, especially, it is quite achievable to gain performance on this level of attack according to the experiments carried out in this thesis. The secure routing techniques introduced have been found to outperform those without the techniques under investigation. The simulation performed for default Chord overly and the modified Chord, yielded interesting results, for dropper nodes, random lookup routs and colluding sub-ring attacks.
Place, publisher, year, edition, pages
2015. , 78 p.
p2p, secure routing, DHT, Chord
Computer and Information Science
IdentifiersURN: urn:nbn:se:miun:diva-24265OAI: oai:DiVA.org:miun-24265DiVA: diva2:785393
Subject / course
Computer Engineering DT1
International Master's Programme in Computer Engineering TDAAA 120 higher education credits
2014-12-20, L207, Holmgatan 10, SE-851 70, Sundsvall, 21:28 (English)
Forsström, Stefan, Doctor
Zhang, Tingting, Professor