Securing Structured Overlays against Identity Attacks

@article{Puttaswamy2009SecuringSO,
  title={Securing Structured Overlays against Identity Attacks},
  author={Krishna P. N. Puttaswamy and Haitao Zheng and Ben Y. Zhao},
  journal={IEEE Transactions on Parallel and Distributed Systems},
  year={2009},
  volume={20},
  pages={1487-1498}
}
Structured overlay networks can greatly simplify data storage and management for a variety of distributed applications. Despite their attractive features, these overlays remain vulnerable to the Identity attack, where malicious nodes assume control of application components by intercepting and hijacking key-based routing requests. Attackers can assume arbitrary application roles such as storage node for a given file, or return falsified contents of an online shopper's shopping cart. In this… CONTINUE READING

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-10 of 40 references

Towards a common API for structured P2P overlays

  • F. DABEK, B. ZHAO, P. DRUSCHEL, J. KUBIATOWICZ, I. STO- ICA
  • In Proc. of IPTPS(February
  • 2003
Highly Influential
3 Excerpts

Similar Papers

Loading similar papers…