Defending Eclipse Attack in I2P Using Structured Overlay Network

The ‘Darknet’ is a part of cyberspace that is hidden from the ‘Surface web’. In Darknet both publishers and visitors are anonymous. There are several ways to access Darknet such as through Freenet, TOR and I2P. Though I2P is a decentralized anonymous network, there are several security risks incorporated with Distributed Hash Table (DHT) that may breach anonymity of I2P. In this paper, the authors will study basics of I2P, eclipse attack and existing defense mechanism of eclipse attack and the mechanism to prevent the eclipse attack.

Resource Details

Provided by:
Creative Commons