Secure Routing in Structured Peer to Peer File-Sharing Networks

被引:0
作者
Navabpour, Samaneh [1 ,2 ]
Asl, Negin F. Nejad [1 ,2 ]
Abbaspour, Maghsoud [1 ,2 ]
Behzadi, Akbar [2 ]
机构
[1] Shahid Beheshti Univ, Elect & Comp Dept, POB 19395-1795, Tehran, Iran
[2] Inst Studies Theoret Phys & Math, Network Dept, Tehran, Iran
来源
2006 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA | 2006年
关键词
File Sharing; Peer-to-Peer; Routing; Security;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Structured P2P protocols have recently become the ultimate solution in creating large-scale distributed networks, because they provide a powerful platform for providing various decentralized services. Structured P2P protocols have created file sharing networks with high fault tolerance, but still lack security in routing. Messages can still be corrupted, incorrectly routed, and can be responded by illegitimate nodes. Because of their decentralized characteristics insecure routing can destroy the networks' integrity. This paper studies attacks aimed at correct routing in structured p2p file sharing networks and presents techniques for defenses against them. This paper will fully describe and prove the validation of these techniques and evaluate them in the end.
引用
收藏
页数:5
相关论文
共 12 条
  • [1] Secure routing for structured peer-to-peer overlay networks
    Castro, M
    Druschel, P
    Ganesh, A
    Rowstron, A
    Wallach, DS
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2002, : 299 - 314
  • [2] Clarke I., 2000, Workshop on Design Issues in Anonymity and, Unobservability, P311
  • [3] The Sybil attack
    Douceur, JR
    [J]. PEER-TO-PEER SYSTEMS, 2002, 2429 : 251 - 260
  • [4] Dumitriu D., 2005, Performance Evaluation Review, V33, P38, DOI 10.1145/1071690.1064218
  • [5] Freedman M. J., 2002, P 1 INT WORKSH PEER, P129
  • [6] Kamvar S. D., 2003, ACM INT C WORLD WIDE, P640, DOI DOI 10.1145/775152.775242
  • [7] Scalable supernode selection in peer-to-peer overlay networks
    Lo, V
    Zhou, DY
    Liu, YH
    GauthierDickey, C
    Li, J
    [J]. Second International Workshop on Hot Topics in Peer-to-Peer Systems, Proceedings, 2005, : 18 - 25
  • [8] Maymounkov P, 2002, LECT NOTES COMPUT SC, V2429, P53
  • [9] Rowstron A., 2001, Proceedings of IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), V2218, P329, DOI 10.1007/3-540-45518-3_18
  • [10] Sit E, 2002, LECT NOTES COMPUT SC, V2429, P261