{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T15:21:20Z","timestamp":1773760880032,"version":"3.50.1"},"reference-count":90,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union Programme of High Level Scholarships for Latin America","award":["E05D052447VE"],"award-info":[{"award-number":["E05D052447VE"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2011,1]]},"abstract":"<jats:p>Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been shown to be notoriously difficult to protect against security attacks. Various reports have been published that discuss or classify general security issues, but so far a comprehensive survey describing the various proposed defenses has been lacking. In this article, we present an overview of techniques reported in the literature for making DHT-based systems resistant to the three most important attacks that can be launched by malicious nodes participating in the DHT: (1) the Sybil attack, (2) the Eclipse attack, and (3) routing and storage attacks. We review the advantages and disadvantages of the proposed solutions and, in doing so, confirm how difficult it is to secure DHT-based systems in an adversarial environment.<\/jats:p>","DOI":"10.1145\/1883612.1883615","type":"journal-article","created":{"date-parts":[[2011,2,1]],"date-time":"2011-02-01T15:50:21Z","timestamp":1296575421000},"page":"1-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":116,"title":["A survey of DHT security techniques"],"prefix":"10.1145","volume":"43","author":[{"given":"Guido","family":"Urdaneta","sequence":"first","affiliation":[{"name":"VU University, Amsterdam, The Netherlands"}]},{"given":"Guillaume","family":"Pierre","sequence":"additional","affiliation":[{"name":"VU University, Amsterdam, The Netherlands"}]},{"given":"Maarten Van","family":"Steen","sequence":"additional","affiliation":[{"name":"VU University, Amsterdam, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2011,2,4]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2006.101"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353343.1353349"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the 31st International Colloquium on Automata, Languages and Programming (ICALP). Lecture Notes on Computer Science","volume":"3142","author":"Awerbuch B.","unstructured":"Awerbuch , B. and Scheideler , C . 2004. Group spreading: A protocol for provably secure distributed name service . In Proceedings of the 31st International Colloquium on Automata, Languages and Programming (ICALP). Lecture Notes on Computer Science , vol. 3142 . Springer-Verlag, Berlin, Germeny, 183--195. Awerbuch, B. and Scheideler, C. 2004. Group spreading: A protocol for provably secure distributed name service. In Proceedings of the 31st International Colloquium on Automata, Languages and Programming (ICALP). Lecture Notes on Computer Science, vol. 3142. Springer-Verlag, Berlin, Germeny, 183--195."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148109.1148163"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the 6th International Workshop on Peer-to-Peer Systems.","author":"Awerbuch B.","unstructured":"Awerbuch , B. and Scheideler , C . 2007. Towards scalable and robust overlay networks . In Proceedings of the 6th International Workshop on Peer-to-Peer Systems. Awerbuch, B. and Scheideler, C. 2007. Towards scalable and robust overlay networks. In Proceedings of the 6th International Workshop on Peer-to-Peer Systems."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2007.4447808"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073814.1073873"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11945529_26"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the 9th Conference on Hot Topics in Operating Systems. USENIX","author":"Blake C.","unstructured":"Blake , C. and Rodrigues , R . 2003. High Availability, scalable storage, dynamic peer networks: Pick two . In Proceedings of the 9th Conference on Hot Topics in Operating Systems. USENIX , Berkeley, CA, 1--6. Blake, C. and Rodrigues, R. 2003. High Availability, scalable storage, dynamic peer networks: Pick two. In Proceedings of the 9th Conference on Hot Topics in Operating Systems. USENIX, Berkeley, CA, 1--6."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2006.10"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2004.7"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the International Conference on Dependable Systems and Networks. IEEE Computer Society Press","author":"Castro M.","unstructured":"Castro , M. , Costa , M. , and Rowstron , A . 2004. Performance and dependability of structured peer-to-peer overlays . In Proceedings of the International Conference on Dependable Systems and Networks. IEEE Computer Society Press , Los Alamitos, CA, 9--18. Castro, M., Costa, M., and Rowstron, A. 2004. Performance and dependability of structured peer-to-peer overlays. In Proceedings of the International Conference on Dependable Systems and Networks. IEEE Computer Society Press, Los Alamitos, CA, 9--18."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060317"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.803069"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the Global Telecommunications Conference (GLOBECOM). IEEE Computer Society Press","author":"Cerri D.","unstructured":"Cerri , D. , Ghioni , A. , Paraboschi , S. , and Tiraboschi , S . 2005. ID mapping attacks in P2P networks . In Proceedings of the Global Telecommunications Conference (GLOBECOM). IEEE Computer Society Press , Los Alamitos, CA. Cerri, D., Ghioni, A., Paraboschi, S., and Tiraboschi, S. 2005. ID mapping attacks in P2P networks. In Proceedings of the Global Telecommunications Conference (GLOBECOM). IEEE Computer Society Press, Los Alamitos, CA."},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the 13th Symposium on Network and Distributed System Security. The Internet Society","author":"Condie T.","unstructured":"Condie , T. , Kacholia , V. , Sankararaman , S. , Hellerstein , J. , and Maniatis , P . 2006. Induced churn as shelter from routing table poisoning . In Proceedings of the 13th Symposium on Network and Distributed System Security. The Internet Society , San Diego, CA. Condie, T., Kacholia, V., Sankararaman, S., Hellerstein, J., and Maniatis, P. 2006. Induced churn as shelter from routing table poisoning. In Proceedings of the 13th Symposium on Network and Distributed System Security. The Internet Society, San Diego, CA."},{"key":"e_1_2_1_18_1","unstructured":"Crosby S. and Wallach D. S. 2007. An analysis of BitTorrent's two kademlia-based DHTs. Tech. rep. TR-07-04. Department of Computer Science Rice University Houston.  Crosby S. and Wallach D. S. 2007. An analysis of BitTorrent's two kademlia-based DHTs. Tech. rep. TR-07-04. Department of Computer Science Rice University Houston."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502054"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the 1st Symposium on Networked Systems Design and Implementation. USENIX","author":"Dabek F.","unstructured":"Dabek , F. , Li , J. , Sit , E. , Robertson , J. , Kaashoek , M. F. , and Morris , R . 2004. Designing a DHT for low latency and high throughput . In Proceedings of the 1st Symposium on Networked Systems Design and Implementation. USENIX , Berkeley, CA, 85--98. Dabek, F., Li, J., Sit, E., Robertson, J., Kaashoek, M. F., and Morris, R. 2004. Designing a DHT for low latency and high throughput. In Proceedings of the 1st Symposium on Networked Systems Design and Implementation. USENIX, Berkeley, CA, 85--98."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2007.77"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_18"},{"key":"e_1_2_1_23_1","volume-title":"Dept. of Computer Science","author":"Daswani N.","unstructured":"Daswani , N. 2004. Denial -of-service (DoS) attacks and commerce infrastructure in peer-to-peer networks. Ph.D. dissertation , Dept. of Computer Science , Stanford University, Stanford , CA. Daswani, N. 2004. Denial-of-service (DoS) attacks and commerce infrastructure in peer-to-peer networks. Ph.D. dissertation, Dept. of Computer Science, Stanford University, Stanford, CA."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/41840.41841"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.45"},{"key":"e_1_2_1_26_1","series-title":"Lecture Notes on Computer Science","volume-title":"Proceedings of the 1st International Workshop on Peer-to-Peer Systems","author":"Douceur J. R.","unstructured":"Douceur , J. R. 2002. The Sybil attack . In Proceedings of the 1st International Workshop on Peer-to-Peer Systems . Lecture Notes on Computer Science , vol. 2429 . Springer-Verlag, Berlin , Germany , 251--260. Douceur, J. R. 2002. The Sybil attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2429. Springer-Verlag, Berlin, Germany, 251--260."},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the 13th Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics","author":"Fiat A.","unstructured":"Fiat , A. and Saia , J . 2002. Censorship resistant peer-to-peer content addressable networks . In Proceedings of the 13th Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics , Philadelphia, PA, 94--103. Fiat, A. and Saia, J. 2002. Censorship resistant peer-to-peer content addressable networks. In Proceedings of the 13th Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, Philadelphia, PA, 94--103."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.4086\/toc.2007.v003a001"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/11561071_71"},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the 2nd Symposium on Networked Systems Design and Implementation. ACM Press","author":"Fonseca R.","unstructured":"Fonseca , R. , Ratnasamy , S. , Zhao , J. , Ee , C. T. , Culler , D. E. , Shenker , S. , and Stoica , I . 2005. Beacon vector routing: Scalable point-to-point routing in wireless sensornets . In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation. ACM Press , New York, NY, 1--11. Fonseca, R., Ratnasamy, S., Zhao, J., Ee, C. T., Culler, D. E., Shenker, S., and Stoica, I. 2005. Beacon vector routing: Scalable point-to-point routing in wireless sensornets. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation. ACM Press, New York, NY, 1--11."},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the 13th International Conference on Network Protocols. IEEE Computer Society Press","author":"Ganesh L.","unstructured":"Ganesh , L. and Zhao , B. Y . 2005. Identity theft protection in structured overlays . In Proceedings of the 13th International Conference on Network Protocols. IEEE Computer Society Press , Los Alamitos, CA, 49--54. Ganesh, L. and Zhao, B. Y. 2005. Identity theft protection in structured overlays. In Proceedings of the 13th International Conference on Network Protocols. IEEE Computer Society Press, Los Alamitos, CA, 49--54."},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the 23rd Annual Joint Conference of the IEE Computer and Communications Socities (Infocom).","volume":"4","author":"Godfrey B.","unstructured":"Godfrey , B. , Lakshminarayanan , K. , Surana , S. , Karp , R. M. , and Stoica , I . 2004. Load balancing in dynamic structured P2P systems . In Proceedings of the 23rd Annual Joint Conference of the IEE Computer and Communications Socities (Infocom). Vol. 4 . IEEE Computer Society Press, Los Alamitos, CA, 2253--2262. Godfrey, B., Lakshminarayanan, K., Surana, S., Karp, R. M., and Stoica, I. 2004. Load balancing in dynamic structured P2P systems. In Proceedings of the 23rd Annual Joint Conference of the IEE Computer and Communications Socities (Infocom). Vol. 4. IEEE Computer Society Press, Los Alamitos, CA, 2253--2262."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159931"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863998"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the 1st Symposium on Networked Systems Design and Implementation. USENIX","author":"Gupta A.","unstructured":"Gupta , A. , Liskov , B. , and Rodrigues , R . 2004. Efficient routing for peer-to-peer overlays . In Proceedings of the 1st Symposium on Networked Systems Design and Implementation. USENIX , Berkeley, CA, 113--126. Gupta, A., Liskov, B., and Rodrigues, R. 2004. Efficient routing for peer-to-peer overlays. In Proceedings of the 1st Symposium on Networked Systems Design and Implementation. USENIX, Berkeley, CA, 113--126."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_15"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2006.44"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the 17th International Symposium on Distributed Computing (DISC). Lecture Notes on Computer Science","volume":"2848","author":"Hildrum K.","unstructured":"Hildrum , K. and Kubiatowicz , J . 2003. Asymptotically efficient approaches to fault-tolerance in peer-to-peer networks . In Proceedings of the 17th International Symposium on Distributed Computing (DISC). Lecture Notes on Computer Science , vol. 2848 . Springer-Verlag, Berlin, German, 321--336. Hildrum, K. and Kubiatowicz, J. 2003. Asymptotically efficient approaches to fault-tolerance in peer-to-peer networks. In Proceedings of the 17th International Symposium on Distributed Computing (DISC). Lecture Notes on Computer Science, vol. 2848. Springer-Verlag, Berlin, German, 321--336."},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET). USENIX","author":"Holz T.","unstructured":"Holz , T. , Steiner , M. , Dahl , F. , Biersack , E. , and Freiling , F . 2008. Measurements and mitigation of peer-to-peer-based botnets: A case study on Storm Worm . In Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET). USENIX , Berkeley, CA, 1--9. Holz, T., Steiner, M., Dahl, F., Biersack, E., and Freiling, F. 2008. Measurements and mitigation of peer-to-peer-based botnets: A case study on Storm Worm. In Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET). USENIX, Berkeley, CA, 1--9."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00224-006-1246-6"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335325"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1435497.1435501"},{"key":"e_1_2_1_43_1","unstructured":"Levine B. N. Shields C. and Margolin B. N. 2006. A survey of solutions to the Sybil attack. Tech. rep. University of Massachusetts Amherst Amherst MA.  Levine B. N. Shields C. and Margolin B. N. 2006. A survey of solutions to the Sybil attack. Tech. rep. University of Massachusetts Amherst Amherst MA."},{"key":"e_1_2_1_44_1","volume-title":"Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Computer Society Press","author":"Li J.","unstructured":"Li , J. , Stribling , J. , Morris , R. , Kaashoek , M. F. , and Gil , T. M . 2005. A Performance vs. cost framework for evaluating DHT design tradeoffs under churn . In Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Computer Society Press , Los Alamitos, CA. 225--236. Li, J., Stribling, J., Morris, R., Kaashoek, M. F., and Gil, T. M. 2005. A Performance vs. cost framework for evaluating DHT design tradeoffs under churn. In Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Computer Society Press, Los Alamitos, CA. 225--236."},{"key":"e_1_2_1_45_1","unstructured":"Los Angeles Times. 2006. EDonkey file-sharing network is shut down. http:\/\/articles.latimes.com\/2006\/sep\/13\/business\/fi-donkey13.  Los Angeles Times. 2006. EDonkey file-sharing network is shut down. http:\/\/articles.latimes.com\/2006\/sep\/13\/business\/fi-donkey13."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1016527.1016531"},{"key":"e_1_2_1_47_1","series-title":"Lecture Notes on Computer Science","volume-title":"Informant: Detecting Sybils using incentives. In Proceedings of the 11th International Conference on Financial Cryptography and Data Security","author":"Margolin N. B.","year":"2007","unstructured":"Margolin , N. B. and Levine , B. N . 2007 . Informant: Detecting Sybils using incentives. In Proceedings of the 11th International Conference on Financial Cryptography and Data Security . Lecture Notes on Computer Science , vol. 4886 . Springer-Verlag , Berlin, Germany , 192--207. Margolin, N. B. and Levine, B. N. 2007. Informant: Detecting Sybils using incentives. In Proceedings of the 11th International Conference on Financial Cryptography and Data Security. Lecture Notes on Computer Science, vol. 4886. Springer-Verlag, Berlin, Germany, 192--207."},{"key":"e_1_2_1_48_1","series-title":"Lecture Notes on Computer Science","volume-title":"Kademlia: A peer-to-peer information system based on the XOR metric. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems","author":"Maymounkov P.","year":"2002","unstructured":"Maymounkov , P. and Mazi\u00e8res , D . 2002 . Kademlia: A peer-to-peer information system based on the XOR metric. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems . Lecture Notes on Computer Science , vol. 2429 . Springer-Verlag , Berlin, Germany , 53--65. Maymounkov, P. and Mazi\u00e8res, D. 2002. Kademlia: A peer-to-peer information system based on the XOR metric. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2429. Springer-Verlag, Berlin, Germany, 53--65."},{"key":"e_1_2_1_49_1","volume-title":"RR2005-01","author":"Mesaros V.","year":"2005","unstructured":"Mesaros , V. , Collet , R. , Glynn , K. , and Van Roy , P. 2005 . A transactional system for structured overlay networks. Tech. rep . RR2005-01 , Universit Catholique de Louvain. Louvain, Belgium. Mesaros, V., Collet, R., Glynn, K., and Van Roy, P. 2005. A transactional system for structured overlay networks. Tech. rep. RR2005-01, Universit Catholique de Louvain. Louvain, Belgium."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANSS-41.2008.38"},{"key":"e_1_2_1_51_1","volume-title":"Proceedings of the 2nd International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science","volume":"2735","author":"Naor M.","unstructured":"Naor , M. and Wieder , U . 2003. A simple fault tolerant distributed hash table . In Proceedings of the 2nd International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science , vol. 2735 . Springer-Verlag, Berlin, Germany, 88--97. Naor, M. and Wieder, U. 2003. A simple fault tolerant distributed hash table. In Proceedings of the 2nd International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2735. Springer-Verlag, Berlin, Germany, 88--97."},{"key":"e_1_2_1_52_1","volume-title":"Proceedings of the 7th Symposium on Operating System Design and Implementation. USENIX","author":"Peterson L.","unstructured":"Peterson , L. , Bavier , A. , Fiuczynski , M. E. , and Muir , S . 2006. Experiences building PlanetLab . In Proceedings of the 7th Symposium on Operating System Design and Implementation. USENIX , Berkeley, CA. Peterson, L., Bavier, A., Fiuczynski, M. E., and Muir, S. 2006. Experiences building PlanetLab. In Proceedings of the 7th Symposium on Operating System Design and Implementation. USENIX, Berkeley, CA."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1678120"},{"key":"e_1_2_1_54_1","series-title":"Lecture Notes on Computer Science","volume-title":"Distributed Systems: Operations and Management","author":"Plantikow S.","year":"2007","unstructured":"Plantikow , S. , Reinefeld , A. , and Schintke , F . 2007 . Transactions for distributed Wikis on structured overlays. In Proceedings of the 18th Workshop on Distributed Systems: Operations and Management . Lecture Notes on Computer Science , vol. 4785 . Springer-Verlag , Berlin, Germany, 256--267. Plantikow, S., Reinefeld, A., and Schintke, F. 2007. Transactions for distributed Wikis on structured overlays. In Proceedings of the 18th Workshop on Distributed Systems: Operations and Management. Lecture Notes on Computer Science, vol. 4785. Springer-Verlag, Berlin, Germany, 256--267."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.v20:2"},{"key":"e_1_2_1_56_1","volume-title":"Proceedings of the 1st Symposium on Networked Systems Design and Implementation. USENIX","author":"Ramasubramanian V.","unstructured":"Ramasubramanian , V. and Sirer , E. G . 2004a. Beehive: O(1) lookup performance for power-law query distributions in peer-to-peer overlays . In Proceedings of the 1st Symposium on Networked Systems Design and Implementation. USENIX , Berkeley, CA, 99--112. Ramasubramanian, V. and Sirer, E. G. 2004a. Beehive: O(1) lookup performance for power-law query distributions in peer-to-peer overlays. In Proceedings of the 1st Symposium on Networked Systems Design and Implementation. USENIX, Berkeley, CA, 99--112."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015504"},{"key":"e_1_2_1_58_1","volume-title":"Proceedings of the 2nd International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science","volume":"2735","author":"Rao A.","unstructured":"Rao , A. , Lakshminarayanan , K. , Surana , S. , Karp , R. M. , and Stoica , I . 2003. Load balancing in structured P2P systems . In Proceedings of the 2nd International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science , vol. 2735 . Springer-Verlag, Berlin, Germanny, 68--79. Rao, A., Lakshminarayanan, K., Surana, S., Karp, R. M., and Stoica, I. 2003. Load balancing in structured P2P systems. In Proceedings of the 2nd International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2735. Springer-Verlag, Berlin, Germanny, 68--79."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNSR.2005.39"},{"key":"e_1_2_1_61_1","volume-title":"Proceedings of the USENIX Annual Technical Conference. USENIX","author":"Rhea S.","unstructured":"Rhea , S. , Geels , D. , Roscoe , T. , and Kubiatowicz , J . 2004. Handling churn in a DHT . In Proceedings of the USENIX Annual Technical Conference. USENIX , Berkeley, CA, 127--140. Rhea, S., Geels, D., Roscoe, T., and Kubiatowicz, J. 2004. Handling churn in a DHT. In Proceedings of the USENIX Annual Technical Conference. USENIX, Berkeley, CA, 127--140."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558989_21"},{"key":"e_1_2_1_64_1","volume-title":"Proceedings of the 26th Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE Computer Society Press","author":"Rowaihy H.","year":"2007","unstructured":"Rowaihy , H. , Enck , W. , McDaniel , P. , and La Porta , T. 2007 . Limiting Sybil attacks in structured peer-to-peer networks . In Proceedings of the 26th Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE Computer Society Press , Los Alamitos, CA, 2596--2600. Rowaihy, H., Enck, W., McDaniel, P., and La Porta, T. 2007. Limiting Sybil attacks in structured peer-to-peer networks. In Proceedings of the 26th Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE Computer Society Press, Los Alamitos, CA, 2596--2600."},{"key":"e_1_2_1_65_1","series-title":"Lecture Notes on Computer Science","volume-title":"Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proceedings of the Middleware Conference","author":"Rowstron A.","year":"2001","unstructured":"Rowstron , A. and Druschel , P . 2001 a. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proceedings of the Middleware Conference . Lecture Notes on Computer Science , vol. 2218 . Springer-Verlag , Berlin, Germany , 329--350. Rowstron, A. and Druschel, P. 2001a. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proceedings of the Middleware Conference. Lecture Notes on Computer Science, vol. 2218. Springer-Verlag, Berlin, Germany, 329--350."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502053"},{"key":"e_1_2_1_67_1","volume-title":"Proceedings of the 1st International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science","volume":"2429","author":"Saia J.","unstructured":"Saia , J. , Fiat , A. , Gribble , S. D. , Karlin , A. R. , and Saroiu , S . 2002. Dynamically fault-tolerant content addressable networks . In Proceedings of the 1st International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science , vol. 2429 . Springer-Verlag, Berlin, Germany, 270--279. Saia, J., Fiat, A., Gribble, S. D., Karlin, A. R., and Saroiu, S. 2002. Dynamically fault-tolerant content addressable networks. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2429. Springer-Verlag, Berlin, Germany, 270--279."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2005.117"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060694"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1411273.1411280"},{"key":"e_1_2_1_71_1","volume-title":"Proceedings of the 25th Annual Joint Conference of the IEEE Computer and Communiations Societies. IEEE Computer Society Press","author":"Singh A.","unstructured":"Singh , A. , Ngan , T.-W. , Druschel , P. , and Wallach , D. S . 2006. Eclipse attacks on overlay networks: Threats and defenses . In Proceedings of the 25th Annual Joint Conference of the IEEE Computer and Communiations Societies. IEEE Computer Society Press , Los Alamitos, CA, 1--12. Singh, A., Ngan, T.-W., Druschel, P., and Wallach, D. S. 2006. Eclipse attacks on overlay networks: Threats and defenses. In Proceedings of the 25th Annual Joint Conference of the IEEE Computer and Communiations Societies. IEEE Computer Society Press, Los Alamitos, CA, 1--12."},{"key":"e_1_2_1_72_1","volume-title":"Proceedings of the 1st International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science","volume":"2429","author":"Sit E.","unstructured":"Sit , E. and Morris , R . 2002. Security considerations for peer-to-peer distributed hash tables . In Proceedings of the 1st International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science , vol. 2429 . Springer-Verlag, Berlin, Germany, 261--269. Sit, E. and Morris, R. 2002. Security considerations for peer-to-peer distributed hash tables. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2429. Springer-Verlag, Berlin, Germany, 261--269."},{"key":"e_1_2_1_73_1","unstructured":"Skype Limited. 2008. Skype. http:\/\/www.skype.com.  Skype Limited. 2008. Skype. http:\/\/www.skype.com."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.50"},{"key":"e_1_2_1_75_1","volume-title":"Proceedings of the 1st International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science","volume":"2429","author":"Stading T.","unstructured":"Stading , T. , Maniatis , P. , and Baker , M . 2002. Peer-to-peer caching schemes to address flash crowds . In Proceedings of the 1st International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science , vol. 2429 . Springer-Verlag, Berlin, Germany, 203--213. Stading, T., Maniatis, P., and Baker, M. 2002. Peer-to-peer caching schemes to address flash crowds. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2429. Springer-Verlag, Berlin, Germany, 203--213."},{"key":"e_1_2_1_76_1","volume-title":"Proceedings of the 6th International Workshop on Peer-to-Peer Systems.","author":"Steiner M.","unstructured":"Steiner , M. , Biersack , E. W. , and Ennajjary , T . 2007a. Towards scalable and robust overlay networks . In Proceedings of the 6th International Workshop on Peer-to-Peer Systems. Steiner, M., Biersack, E. W., and Ennajjary, T. 2007a. Towards scalable and robust overlay networks. In Proceedings of the 6th International Workshop on Peer-to-Peer Systems."},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290168.1290176"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808407"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009385.1010079"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.11.022"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/774763.774777"},{"key":"e_1_2_1_82_1","series-title":"Lecture Notes on Computer Science","volume-title":"Proceedings of the International Symposium on Software Security","author":"Wallach D.","unstructured":"Wallach , D. 2002. A survey of peer-to-peer security issues . In Proceedings of the International Symposium on Software Security . Lecture Notes on Computer Science , vol. 2609 . Springer-Verlag, Berlin , Germany , 42--57. Wallach, D. 2002. A survey of peer-to-peer security issues. In Proceedings of the International Symposium on Software Security. Lecture Notes on Computer Science, vol. 2609. Springer-Verlag, Berlin, Germany, 42--57."},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2005.27"},{"key":"e_1_2_1_84_1","volume-title":"Myrmic: Secure and robust DHT routing. Tech. rep","author":"Wang P.","year":"2007","unstructured":"Wang , P. , Osipkov , I. , Hopper , N. , and Kim , Y . 2007 . Myrmic: Secure and robust DHT routing. Tech. rep . Digital Technology Center , University of Minnesota at Twin Cities, Minneapolis\/St. Paul, MN. Wang, P., Osipkov, I., Hopper, N., and Kim, Y. 2007. Myrmic: Secure and robust DHT routing. Tech. rep. Digital Technology Center, University of Minnesota at Twin Cities, Minneapolis\/St. Paul, MN."},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2006.137"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.13"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159945"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1007\/11422778_3"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818784"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30183-7_8"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2005.46"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1883612.1883615","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1883612.1883615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:17Z","timestamp":1750243937000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1883612.1883615"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":90,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,1]]}},"alternative-id":["10.1145\/1883612.1883615"],"URL":"https:\/\/doi.org\/10.1145\/1883612.1883615","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1]]},"assertion":[{"value":"2008-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-05-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-02-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}