NodeId Verification Method against Routing Table Poisoning Attack In Chord DHT
- Avinash Chaudhari
- Pradeep Gamit
peer-to-peer, overlay network, distributed hash table, poisoning attack, Sybil attack.
Structured P2P networks are growing very fast because of their scalability, efficiency and reliability. Chord is one of the popular DHTs which generate its NodeId by hashing the IP address of node. As there is no mechanism to verify whether the NodeId is generated correctly or not, malicious nodes can generate multiple NodeIds easily. So genuine node’s routing tables can be easily poisoned with fake NodeIds. In this paper we proposed the NodeId verification mechanism which will verify whether NodeId is generated correctly or not before updating the routing table entry. We will then analyse and compare the results of mitigation mechanism under attack.
Avinash Chaudhari, Pradeep Gamit. "NodeId Verification Method against Routing Table Poisoning Attack In Chord DHT".INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH ISSN:2321-9939, Vol.2, Issue 2, pp.2167-2172, URL :https://rjwave.org/ijedr/papers/IJEDR1402142.pdf
Volume 2 Issue 2
Pages. 2167-2172