CR-Chord: Improving Lookup Availability in the Presence of Malicious DHT Nodes

Distributed Hash Tables (DHTs) provide a useful key-to-value lookup service for many Internet applications. However, without additional mechanisms DHTs are vulnerable to attacks. In particular, previous research showed that Chord is not well resistant to malicious nodes that joined the DHT. The authors introduce the Cyclic Routing algorithm as an extension of Chord (CR-Chord). Using simulations they compare the lookup availability of Chord and CR-Chord. The results suggest that CR-Chord improves the lookup availability on the average by 1.4 times. When the number of malicious nodes is small, such as 5%, CR-Chord has almost twice lower lookup failure rate.

Provided by: Reed Elsevier Topic: Mobility Date Added: Jun 2011 Format: PDF

Find By Topic