1 / 10

The Exclusion of Malicious Routing Peers in Structured P2P Systems

The Exclusion of Malicious Routing Peers in Structured P2P Systems. Authors: Bong-Soo Roh, O-Hoon Kwon, Sung Je Hong , and Jong Kim Source: Agents and Peer-to-Peer Computing, LNCS 4461, pp. 43-50, 2008 Speaker: Shu-Fen Chiou ( 邱淑芬 ). Normal routing in Chord. Finger Table. K54. Query: K54.

Download Presentation

The Exclusion of Malicious Routing Peers in Structured P2P Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Exclusion of Malicious Routing Peers in Structured P2P Systems Authors: Bong-Soo Roh, O-Hoon Kwon, Sung Je Hong, and Jong Kim Source: Agents and Peer-to-Peer Computing, LNCS 4461, pp. 43-50, 2008 Speaker: Shu-Fen Chiou (邱淑芬)

  2. Normal routing in Chord Finger Table K54 Query: K54 Normal routing

  3. Incorrect lookup routing Case 2:Deliver message to non-existing node Case 1: Deliver message to incorrect node K54 K54 N3 Query: K54 Query: K54 N51 N51 N51:malicious node

  4. One simple solving method • Alternate lookup path Finger Table K54 Query: K54 N51 • The method still has problem: • The malicious node also • can join the next routing.

  5. Motivation • Exclude the malicious routing from the normal routing process. • Compare with other algorithms, the proposed method can be reduced the routing length.

  6. Proposed method Finger Table K54 (MRN) claim Query: K54 N51 claim (PGN) MRN: MisRouting Node PGN: Previous Good Node

  7. Proposed method (TCR: Total Claim Ratio) • N42 • Step 1: find the minimum TCR successor and verify N51 K54 Query: K54 N51 Minimum

  8. Proposed method • N42 • Step 2: Update the TCR of N51

  9. 本篇的優缺點 • 優點: • 增加一個欄位即可避免惡意節點incorrect routing的問題

  10. 未來可能研究方向 • 類似TCR model的設計。 • Survey其他securerouting的papers,發展出我們的secure routing protocol。

More Related