Insertion of Public Key Infrastructure in the OpenDHT Project
Abstract
Distributed Hash Table (DHT) peer-to-peer (P2P) overlay networks have gained attention in the literature due to their characteristics such as high availability, scalability, among others. The popular implementation is the OpenDHT project, however, it does not handle the authentication of message neither nodes. Thus, it is susceptible to several attacks, including Sybil attack. In this way, the respective work aims to fill this gap through a Public Key Infrastructure. Scyther tool demonstrates the security of proposal against well-known attacks, and practical tests indicate success of implementation.
References
Cremers, C. J. (2008). The scyther tool: Verication, falsication, and analysis of security protocols. In International conference on computer aided verication, pages 414–418. Springer.
Eisele, S., Mardari, I., Dubey, A., and Karsai, G. (2017). Riaps: Resilient information architecture platform for decentralized smart systems. In 2017 IEEE 20th International Symposium on Real-Time Distributed Computing (ISORC), pages 125–132. IEEE.
Hassanzadeh-Nazarabadi, Y., Küpçü, A., and Özkasap, Ö. (2018). Decentralized and locality aware replication method for dht-based p2p storage systems. Future Generation Computer Systems, 84:32–46.
Hassanzadeh-Nazarabadi, Y., Küpçü, A., and Özkasap, c. (2019). Lightchain: A arXiv preprint ardht-based blockchain for resource constrained environments. Xiv:1904.00375.
Li, J., Li, T., Ren, J., and Chao, H.-C. (2018). Enjoy the benet of network coding: Combat pollution attacks in 5g multihop networks. Wireless Communications and Mobile Computing, 2018.
Lim, J. B., Yu, H. C., and Gil, J. M. (2017). Detecting sybil attacks in cloud computing environments based on fail-stop signature. Symmetry, 9.
Maymounkov, P. and Mazieres, D. (2002). Kademlia: A peer-to-peer information system based on the xor metric. In International Workshop on Peer-to-Peer Systems, pages 53–65. Springer.
Panos, C., Ntantogian, C., Malliaros, S., and Xenakis, C. (2017). Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks. Computer Networks, 113:94–110.
Pecori, R. and Veltri, L. (2018). A balanced trust-based method to counter sybil and spartacus attacks in chord. Security and Communication Networks, 2018.
Rodrigues, A. S., Rizzetti, T. A., Canha, L. N., Milbradt, R. G., Appel, S. F., and Duarte, Y. S. (2016). Implementing a distributed rewall using a dht network applied to smart grids. In 2016 51st International Universities Power Engineering Conference (UPEC), pages 1–5. IEEE.
Srinivasan, A. and Aldharrab, H. (2019). Xtra-extended bit-torrent protocol for authenticated covert peer communication. Peer-to-Peer Networking and Applications, 12(1):143–157.
