Defending Eclipse Attack in I2P Using Structured Overlay Network

Download Now
Provided by: Creative Commons
Topic: Networking
Format: PDF
The 'Darknet' is a part of cyberspace that is hidden from the 'Surface web'. In Darknet both publishers and visitors are anonymous. There are several ways to access Darknet such as through Freenet, TOR and I2P. Though I2P is a decentralized anonymous network, there are several security risks incorporated with Distributed Hash Table (DHT) that may breach anonymity of I2P. In this paper, the authors will study basics of I2P, eclipse attack and existing defense mechanism of eclipse attack and the mechanism to prevent the eclipse attack.
Download Now

Find By Topic