Sciweavers

EUROMICRO
2006
IEEE

Authentication in Stealth Distributed Hash Tables

14 years 5 months ago
Authentication in Stealth Distributed Hash Tables
Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of nodes can actually have a detrimental effect upon performance. We now acknowledge that nodes on the same overlay may also differ in terms of their trustworthiness. However, implementing and enforcing security policies in a network where all nodes are treated equally is a non-trivial task. We therefore extend our previous work on Stealth DHTs to consider the differentiation of nodes based on their trustworthiness rather than their capabilities alone. Key words: Distributed Hash Table, Peer-to-Peer, Security, Public Key Infrastructure, Stealth DHT
Andrew MacQuire, Andrew Brampton, Idris A. Rai, Ni
Added 11 Jun 2010
Updated 11 Jun 2010
Type Conference
Year 2006
Where EUROMICRO
Authors Andrew MacQuire, Andrew Brampton, Idris A. Rai, Nicholas J. P. Race, Laurent Mathy
Comments (0)