2002
DOI: 10.1007/3-540-45748-8_25
|View full text |Cite
|
Sign up to set email alerts
|

Security Considerations for Peer-to-Peer Distributed Hash Tables

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
193
0
2

Year Published

2005
2005
2014
2014

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 258 publications
(195 citation statements)
references
References 8 publications
0
193
0
2
Order By: Relevance
“…Nevertheless unreliable nodes may lead to a series of problems. Sit et al [16] classify DHT security attacks into three broad categories:…”
Section: Security Threatsmentioning
confidence: 99%
“…Nevertheless unreliable nodes may lead to a series of problems. Sit et al [16] classify DHT security attacks into three broad categories:…”
Section: Security Threatsmentioning
confidence: 99%
“…However, security protocols like TLS may raise performance issues for the servers [8] when facing a large number of endpoints. Other non-VoIP specific threats have been identified in the VoIP P2P architecture [9] as well as in the VoIP web-based architecture where automated WebPhone account creation may lead to the same undesirable consequences as in WebMail. For the latter, the CAPTCHA 3 protection has showed its limits [10], and even if enhancements are proposed [11], the balance between CAPTCHA robustness and usability is tricky to find [12].…”
Section: Threats and Protection Mechanisms In The Intra-domain Contextmentioning
confidence: 99%
“…Eventually, pre-routing may be achieved during this phase to direct the SIP INVITE request to the right entity in the receiving domain, thus saving processing in intermediary entities. -Insertion of an Identification-Token (IT) inside the SIP-INVITE request which authenticates a given transaction and can be checked straightaway by the receiver 9 , thus limiting DoS risks. -Use of symmetric cryptographic algorithms for performance considerations.…”
Section: Design Principlesmentioning
confidence: 99%
“…We selected the Chord [3] structured overlay to provide lookup services for the Trinity [1] system because Chord has good performance characteristics and provides control over the location of peers within the overlay, making it easier to secure [5,6].…”
Section: Preliminariesmentioning
confidence: 99%