Paper Title

NodeId Verification Method against Routing Table Poisoning Attack In Chord DHT

Authors

  • Avinash Chaudhari
  • Pradeep Gamit

Keywords

peer-to-peer, overlay network, distributed hash table, poisoning attack, Sybil attack.

Abstract

Structured P2P networks are growing very fast because of their scalability, efficiency and reliability. Chord is one of the popular DHTs which generate its NodeId by hashing the IP address of node. As there is no mechanism to verify whether the NodeId is generated correctly or not, malicious nodes can generate multiple NodeIds easily. So genuine node’s routing tables can be easily poisoned with fake NodeIds. In this paper we proposed the NodeId verification mechanism which will verify whether NodeId is generated correctly or not before updating the routing table entry. We will then analyse and compare the results of mitigation mechanism under attack.

Article Type

Published

How To Cite

Avinash Chaudhari, Pradeep Gamit. "NodeId Verification Method against Routing Table Poisoning Attack In Chord DHT".INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH ISSN:2321-9939, Vol.2, Issue 2, pp.2167-2172, URL :https://rjwave.org/ijedr/papers/IJEDR1402142.pdf

Issue

Volume 2 Issue 2 

Pages. 2167-2172

Article Preview