Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

In the BitTorrent P2P file distribution protocol a file is broken into blocks, a

ID: 3819058 • Letter: I

Question

In the BitTorrent P2P file distribution protocol a file is broken into blocks, and the peers redistribute the blocks to each other. Without any protection, a hacker can easily attack the torrent system by masquerading as a peer and sending bogus blocks to a small subset of peers in the torrent. These unsuspecting peers then redistribute the bogus blocks to other peers, which in turn redistribute the bogus blocks to even more peers. Thus, it is critical for BitTorrent to have a mechanism that allows a peer to defend against this attack. Assume that when a peer joins a torrent, it initially gets a .torrent file from a fully trusted source. Describe a simple schema that allows peers to defend against this attack.

Explanation / Answer

Actually torrent files will not encrypt so that intruders can know the IP address and then they will change IP address and insert bogus blocks. It is not possible to defend all malicious blocks but using this simple schema strategy we can defend bogus blocks.

Here is the schema..