|
Kademlia is the most popular deployed structured peer-to-peer protocol, which has a number of desirable advantages that other previous protocols do not offer. However, Kademlia is also vulnerable to the common attacks on the peer-to-peer overlay, although it has some subtle properties that can mitigate the harmfulness of certain attacks. In this paper, we discuss security issues of Kademlia and present some practical extensions of the protocol: a verifiable way of generating node IDs, verifiable routing table updating, and secure message forwarding. |
|
Keywords:Kademlia;Peer-to-Peer Networks;Distributed Hash Table;Network Security;Public Key Cryptography |
|