The Impact of Routing Attacks on Pastry-Based P2P Online Social Networks

  • Felix A. Eichert
  • Markus Monhof
  • Kalman Graffi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8805)


Peer-to-Peer (p2p) networks are common in several areas by now. Besides the well-known file sharing platforms, p2p overlays also emerge as a basis for decentralized social networks. In these, the overlay is used as robust storage for several kinds of social information. With gaining relevance, attackers might have an interest in tampering the functionality of the overlay. In this paper we investigate the routing attacks on the distributed hash table Pastry that we use as basis in our p2p social network LifeSocial. We determine through simulations the impact of routing attacks on the performance of the overlay.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Buragohain, C., Agrawal, D., Suri, S.: A Game Theoretic Framework for Incentives in P2P Systems. In: IEEE P2P 2003: Proc of the Int. Conf. on Peer-to-Peer Computing, pp. 48–56 (September 2003)Google Scholar
  2. 2.
    Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper. Syst. Rev. 36(SI), 299–314 (2002)CrossRefGoogle Scholar
  3. 3.
    Cornelli, F., Damiani, E., di Vimercati, S., Paraboschi, S., Samarati, P.: Choosing reputable servents in a p2p network. In: ACM WWW 2002: Proc. of the Int. Conf. on World Wide Web, pp. 376–386 (2002)Google Scholar
  4. 4.
    Dabek, F., Zhao, B.Y., Druschel, P., Kubiatowicz, J., Stoica, I.: Towards a Common API for Structured Peer-to-Peer Overlays. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, Springer, Heidelberg (2003)Google Scholar
  5. 5.
    Daswani, N., Garcia-Molina, H., Yang, B.: Open problems in data-sharing peer-to-peer systems. In: Calvanese, D., Lenzerini, M., Motwani, R. (eds.) ICDT 2003. LNCS, vol. 2572, pp. 1–15. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  6. 6.
    Rowstron, A.I.T., Druschel, P.: Storage Management and Caching in PAST, A Large-scale, Persistent Peer-to-peer Storage Utility. In: IEEE HotOS 2001: Proc. of the Workshop on Hot Topics in Operating Systems (2001)Google Scholar
  7. 7.
    Feldman, M., Lai, K., Stoica, I., Chuang, J.: Robust Incentive Techniques for Peer-to-Peer Networks. In: ACM EC 2004: Proc. of the ACM Conf. on Electronic Commerce, pp. 102–111 (2004)Google Scholar
  8. 8.
    Feldotto, M., Graffi, K.: Comparative Evaluation of Peer-to-Peer Systems Using PeerfactSim.KOM. In: IEEE HPCS 2013: Proc. of the Int. Conf. on High Performance Computing and Simulation (2013)Google Scholar
  9. 9.
    Gottron, C., König, A., Steinmetz, R.: A Survey on Security in Mobile Peer-to-Peer Architectures - Overlay-Based vs. Underlay-Based Approaches. Future Internet 2(4), 505–532 (2010)CrossRefGoogle Scholar
  10. 10.
    Graffi, K.: PeerfactSim.KOM: A P2P System Simulator Experiences and Lessons Learned. In: IEEE P2P 2011: Proc. of the Int. Conf. on Peer-to-Peer Computing (2011)Google Scholar
  11. 11.
    Graffi, K., Groß, C., Mukherjee, P., Kovacevic, A., Steinmetz, R.: LifeSocial.KOM: A P2P-based Platform for Secure Online Social Networks. In: IEEE P2P 2010: Proceedings of the International Conference on Peer-to-Peer Computing (2010)Google Scholar
  12. 12.
    Graffi, K., Groß, C., Stingl, D., Hartung, D., Kovacevic, A., Steinmetz, R.: LifeSocial.KOM: A Secure and P2P-based Solution for Online Social Networks. In: Proc. of IEEE CCNC (2011)Google Scholar
  13. 13.
    Graffi, K., Kovacevic, A., Xiao, S., Steinmetz, R.: SkyEye.KOM: An Information Management Over-Overlay for Getting the Oracle View on Structured P2P Systems. In: IEEE ICPADS 2008: Proc. of the Int. Conf. on Parallel and Distributed Systems, IEEE (2008)Google Scholar
  14. 14.
    Graffi, K., Mogre, P.S., Hollick, M., Steinmetz, R.: Detection of Colluding Misbehaving Nodes in Mobile Ad Hoc and Wireless Mesh Networks. In: IEEE Global Telecommunications Conference (GLOBECOM). IEEE (2007)Google Scholar
  15. 15.
    Graffi, K., Mukherjee, P., Menges, B., Hartung, D., Kovacevic, A., Steinmetz, R.: Practical Security in P2P-based Social Networks. In: IEEE LCN 2009: Proceedings of the International Conference on Local Computer Networks (2009)Google Scholar
  16. 16.
    Graffi, K., Podrajanski, S., Mukherjee, P., Kovacevic, A., Steinmetz, R.: A Distributed Platform for Multimedia Communities. In: IEEE ISM 2008: Proceedings of the International Symposium on Multimedia (2008)Google Scholar
  17. 17.
    Graffi, K., Stingl, D., Rückert, J., others: Monitoring and Management of Structured Peer-to-Peer Systems. In: IEEE P2P 2009: Proceedings of the International Conference on Peer-to-Peer Computing (2009)Google Scholar
  18. 18.
    Klerx, T., Graffi, K.: Bootstrapping Skynet: Calibration and Autonomic Self-Control of Structured Peer-to-Peer Networks. In: IEEE P2P 2013: Proceedings of the International Conference on Peer-to-Peer Computing (2013)Google Scholar
  19. 19.
    Kovacevic, A., Kaune, S., Heckel, H., Mink, A., Graffi, K., Heckmann, O., Steinmetz, R.: PeerfactSim.KOM - A Simulator for Large-Scale Peer-to-Peer Networks. Tech. Rep. Tr-2006-06, Technische Universität Darmstadt, Germany (2006)Google Scholar
  20. 20.
    Liang, J., Naoumov, N., Ross, K.W.: The Index Poisoning Attack in P2P File Sharing Systems. In: IEEE INFOCOM 2006: Proceedings of the International Conference on Computer Communications, vol. 6 (2006)Google Scholar
  21. 21.
    Liebau, N., Pussep, K., Graffi, K., Kaune, S., Jahn, E., Beyer, A., Steinmetz, R.: The Impact Of The P2P Paradigm. In: AMCIS 2007: Proceedings of Americas Conference on Information Systems (2007)Google Scholar
  22. 22.
    Mogre, P., Graffi, K., Hollick, M., Steinmetz, R.: A Security Framework for Wireless Mesh Networks. Wireless Communications and Mobile Computing Special Issue: Architectures and Protocols for Wireless Mesh, Ad Hoc, and Sensor Networks (2010)Google Scholar
  23. 23.
    Mogre, P.S., Graffi, K., Hollick, M., Steinmetz, R.: AntSec, WatchAnt, and AntRep: Innovative Security Mechanisms for Wireless Mesh Networks. In: IEEE LCN 2007: Proc. of the Annual Conf. on Local Computer Networks. IEEE (2007)Google Scholar
  24. 24.
    Rowstron, A., Druschel, P.: Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, p. 329. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  25. 25.
    Rowstron, A., Kermarrec, A.-M., Druschel, P.: SCRIBE: The Design of a Large-Scale Event Notification Infrastructure. In: Crowcroft, J., Hofmann, M. (eds.) NGC 2001. LNCS, vol. 2233, p. 30. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  26. 26.
    Schoder, D., Fischbach, K.: Peer-to-Peer Prospects. Communications of the ACM 46(2), 27–29 (2003)CrossRefGoogle Scholar
  27. 27.
    Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. In: SIGCOMM 2001: Proceedings of the International Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ACM (2001)Google Scholar
  28. 28.
    Villanueva, R., Villamil, M.-D.-P., Arnedo, M.: Secure routing strategies in dht-based systems. In: Globe 2010: Int. Conf. on Data Management in Grid and Peer-to-Peer Systmes (Globe), pp. 62–74 (2010)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Felix A. Eichert
    • 1
  • Markus Monhof
    • 1
  • Kalman Graffi
    • 2
  1. 1.University of PaderbornGermany
  2. 2.Technology of Social NetworksHeinrich Heine University DüsseldorfGermany

Personalised recommendations