Preventing Sybil attacks in chord and Kademlia protocols
by Zied Trifa
International Journal of Internet Protocol Technology (IJIPT), Vol. 12, No. 3, 2019

Abstract: Structured p2p overlay networks, such as chord, Kademlia, CAN, pastry and tapastry allow participant to generate multiple identities on shared physical node. This practice of Sybil attacks introduces the risks of damaging the routing protocol and blocking access to information by impeding queries. Most existing security monitoring mechanisms are inefficient when applied to structured p2p overlay networks. In this work we propose a monitoring strategy allowing the decrease of Sybil nodes rate. We investigate this problem and find ways to detect suspicious behaviours. The key idea of our solution is to use the attack against the attack. We use Sybil attacks to infiltrate and launch monitor peers under different strategies to maximise the likelihood of detection. We were able to infiltrate and monitor in-depth the overlay using a small number of Sybils introduced in strategic zones, which allows us to estimate the number of malicious nodes. The proposed strategy is evaluated against the use of multiple identities both in chord and Kademlia protocols as most cited and popular p2p overlay networks. We find that adoption of limited number of monitors makes Sybil attacks ineffective.

Online publication date: Mon, 05-Aug-2019

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Internet Protocol Technology (IJIPT):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com