100 likes | 200 Views
The Exclusion of Malicious Routing Peers in Structured P2P Systems. Authors: Bong-Soo Roh, O-Hoon Kwon, Sung Je Hong , and Jong Kim Source: Agents and Peer-to-Peer Computing, LNCS 4461, pp. 43-50, 2008 Speaker: Shu-Fen Chiou ( 邱淑芬 ). Normal routing in Chord. Finger Table. K54. Query: K54.
E N D
The Exclusion of Malicious Routing Peers in Structured P2P Systems Authors: Bong-Soo Roh, O-Hoon Kwon, Sung Je Hong, and Jong Kim Source: Agents and Peer-to-Peer Computing, LNCS 4461, pp. 43-50, 2008 Speaker: Shu-Fen Chiou (邱淑芬)
Normal routing in Chord Finger Table K54 Query: K54 Normal routing
Incorrect lookup routing Case 2:Deliver message to non-existing node Case 1: Deliver message to incorrect node K54 K54 N3 Query: K54 Query: K54 N51 N51 N51:malicious node
One simple solving method • Alternate lookup path Finger Table K54 Query: K54 N51 • The method still has problem: • The malicious node also • can join the next routing.
Motivation • Exclude the malicious routing from the normal routing process. • Compare with other algorithms, the proposed method can be reduced the routing length.
Proposed method Finger Table K54 (MRN) claim Query: K54 N51 claim (PGN) MRN: MisRouting Node PGN: Previous Good Node
Proposed method (TCR: Total Claim Ratio) • N42 • Step 1: find the minimum TCR successor and verify N51 K54 Query: K54 N51 Minimum
Proposed method • N42 • Step 2: Update the TCR of N51
本篇的優缺點 • 優點: • 增加一個欄位即可避免惡意節點incorrect routing的問題
未來可能研究方向 • 類似TCR model的設計。 • Survey其他securerouting的papers,發展出我們的secure routing protocol。