@Srayman I would be cautious for message propagation and storing votes and take into account risks and attack vectors because Kademlia is intended for exchange of transient data between peers in an untrusted network. This is key and should always be considered for all the operations performed on the overlay network.
See for example below which demonstrates that DHT networks (among other attacks) are vulnerable to the index poisoning attack and the routing table poisoning attack: http://sourcedb.ict.cas.cn/cn/ictthesis/201103/P020110314768421277389.pdf
The popularity of Kademlia over other DHTs is likely due to its relative simplicity and performance. It has a number of core features that are not simultaneously offered by other DHTs, such as:
- The number of messages necessary for nodes to learn about each other, is minimized.
- Nodes have enough information to route traffic through low-latency paths.
- Parallel and asynchronous queries are made to avoid timeout delays from failed nodes.
- The node existence algorithm resists certain basic distributed denial-of-service (DDoS) attacks.
Above link also provides a nice comparison between CAN CHORD Kademlia Koord Pastry Tapestry Viceroy protocols.
These protocols can achieve similar performance if parameters are sufficiently well-tuned. However, parameter tuning is a delicate business; not only can different parameters interact within a protocol to affect the cost versus performance tradeoff, but similar parameters in different protocols, such as base and stabilization interval, can behave differently.
This is a study on the connectivity of the overlay network Kademlia in multiple simulated scenarios.
Abovementioned are examples of Structured P2P overlay networks, there also Unstructured P2P overlay networks: Freenet, Gnutella, FastTrack/KaZaA, BitTorrent, Overnet/eDonkey2000. This source provides a nice overview of all protocols:
Careful (risk) analysis and thought must be given in choosing the right protocol. For example. a recent attack has been demonstrated on Ethereum which also uses this protocol: https://arxiv.org/pdf/1908.10141.pdf
While Kademlia is a prominent contender, it also has some issues and risks that need to be addressed.