This document discusses the routing protocols of Distributed Hash Tables (DHTs) in peer-to-peer networks, focusing on the Chord protocol. It addresses the vulnerabilities associated with DHTs, particularly routing attacks, and proposes solutions to mitigate these threats through modifications in the lookup process. The paper also presents a simulation for testing the proposed methods against attacks from malicious nodes.