32nd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO'06)
DOI: 10.1109/euromicro.2006.23
|View full text |Cite
|
Sign up to set email alerts
|

Authentication in Stealth Distributed Hash Tables

Abstract: Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of nodes can actually have a detrimental effect upon performance. In this paper, we acknowledge that nodes on the same overlay may also differ in terms of their trustworthiness. However, implementing and enforcing security policies in a network where all nodes are treated equally is a non-trivial task. We therefore extend our previous wo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
1

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 36 publications
0
5
0
1
Order By: Relevance
“…Certificates of promoted nodes are sent to all nodes using promotion message, which is sent during node's promotion (see Algorithm 1). Therefore, demotion due to contract expiration is simply equivalent to certificate revocation mechanism in PKI ( see [4]). Essentially, it involves all nodes on the network (service nodes and other promoted nodes) that have the ID of the node to be demoted in their routing tables to simply remove the nodes' IDs from their routing tables whenever their certificates expire.…”
Section: Nodes Demotionmentioning
confidence: 99%
See 4 more Smart Citations
“…Certificates of promoted nodes are sent to all nodes using promotion message, which is sent during node's promotion (see Algorithm 1). Therefore, demotion due to contract expiration is simply equivalent to certificate revocation mechanism in PKI ( see [4]). Essentially, it involves all nodes on the network (service nodes and other promoted nodes) that have the ID of the node to be demoted in their routing tables to simply remove the nodes' IDs from their routing tables whenever their certificates expire.…”
Section: Nodes Demotionmentioning
confidence: 99%
“…This is achieved by simply sending a registration message towards their own ID. The registration process should include authentication and certification process that were proposed in [4].…”
Section: Promotion In Stealth Dhtmentioning
confidence: 99%
See 3 more Smart Citations