2008
DOI: 10.1016/j.sysarc.2008.01.004
|View full text |Cite
|
Sign up to set email alerts
|

Authentication in stealth distributed hash tables

Abstract: Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of nodes can actually have a detrimental effect upon performance. We now acknowledge that nodes on the same overlay may also differ in terms of their trustworthiness. However, implementing and enforcing security policies in a network where all nodes are treated equally is a non-trivial task. We therefore extend our previous work on Steal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
3

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 38 publications
0
1
0
Order By: Relevance
“…Such control would, in turn, allow the service provider to repel some of the major common security issues present in peerto-peer networks, such as sniffing, man-in-the-middle, pollution and some denial-of-service attacks, while still benefiting from the scalability and resilience of these networks. We also discuss this topic further in [12].…”
Section: Applications Of Stealth Dhtmentioning
confidence: 99%
“…Such control would, in turn, allow the service provider to repel some of the major common security issues present in peerto-peer networks, such as sniffing, man-in-the-middle, pollution and some denial-of-service attacks, while still benefiting from the scalability and resilience of these networks. We also discuss this topic further in [12].…”
Section: Applications Of Stealth Dhtmentioning
confidence: 99%