Title: Preventing Sybil attacks in chord and Kademlia protocols

Authors: Zied Trifa

Addresses: MIRACL Laboratory, University of Sfax, Tunisia

Abstract: Structured p2p overlay networks, such as chord, Kademlia, CAN, pastry and tapastry allow participant to generate multiple identities on shared physical node. This practice of Sybil attacks introduces the risks of damaging the routing protocol and blocking access to information by impeding queries. Most existing security monitoring mechanisms are inefficient when applied to structured p2p overlay networks. In this work we propose a monitoring strategy allowing the decrease of Sybil nodes rate. We investigate this problem and find ways to detect suspicious behaviours. The key idea of our solution is to use the attack against the attack. We use Sybil attacks to infiltrate and launch monitor peers under different strategies to maximise the likelihood of detection. We were able to infiltrate and monitor in-depth the overlay using a small number of Sybils introduced in strategic zones, which allows us to estimate the number of malicious nodes. The proposed strategy is evaluated against the use of multiple identities both in chord and Kademlia protocols as most cited and popular p2p overlay networks. We find that adoption of limited number of monitors makes Sybil attacks ineffective.

Keywords: Sybil attacks; security; monitoring; chord; Kademlia.

DOI: 10.1504/IJIPT.2019.101364

International Journal of Internet Protocol Technology, 2019 Vol.12 No.3, pp.157 - 166

Received: 01 Dec 2017
Accepted: 18 Nov 2018

Published online: 05 Aug 2019 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article