Jirong Hu
Hunan Information Science Vocational College, 410151, Changsha, China
Cong Wang
Hunan Information Science Vocational College, 410151, Changsha, China
ABSTRACT
Distributed retrieval and routing algorithm based on adaptive DHT have better distribution, self-organization and scalability. These algorithms are becoming structured P2P network researches and application of international hot but relative to the traditional Client/Server network. The decentralization of the P2P network characteristics and the possibility of strong autonomy are dynamic nature of nodes in the network. They are making node implementation malicious behavior greatly increased which made the adaptive DHT node security requirements are difficult to meet. The study has presented adaptive security DHT protocol based on unstructured mapping mechanism. The mechanisms by identifier are grouped in the P2P network nodes are mapped to an unstructured mapping space and through the rational design of routing algorithms. The security work has positioning to the relatively simple node area. Theoretical analysis and experimental results show that this mechanism can be simplified existing adaptive DHT security mechanisms, effectively inhibit the malicious routing behavior to improve the success rate of the resource search.
PDF References Citation
How to cite this article
Jirong Hu and Cong Wang, 2013. Network Topology Based on Unstructured Mapping and Adaptive DHT IN P2P Network. Information Technology Journal, 12: 5195-5200.
DOI: 10.3923/itj.2013.5195.5200
URL: https://scialert.net/abstract/?doi=itj.2013.5195.5200
DOI: 10.3923/itj.2013.5195.5200
URL: https://scialert.net/abstract/?doi=itj.2013.5195.5200
REFERENCES
- Holohan, E. and M. Schukat, 2010. Authentication using virtual certificate authorities: A new security paradigm for wireless sensor networks. Proceedings of the 9th IEEE International Symposium on Network Computing and Applications, July 15-17, 2010, Cambridge, MA., USA., pp: 92-99.
CrossRef - Hu, J.L., X.H. Li, B. Zhou and Y.H. Li, 2010. A reputation based attack resistant distributed trust management model in P2P networks. Proceedings of the 3rd International Symposium on Electronic Commerce and Security, July 29-31, 2010, Guangzhou, China, pp: 237-241.
CrossRef - Marti, S., P. Ganesan and H. Garcia-Molina, 2005. DHT routing using social links. Proceedings of the 3rd International Workshop on Peer-to-Peer Systems III, February 26-27, 2004, La Jolla, CA., USA., pp: 100-111.
CrossRef - Sanchez-Artigas, M., P.G. Lopez, A.F.G. Skarmeta, 2008. Bypass: Providing secure DHT routing through bypassing malicious peers. Proceedings of the IEEE Symposium on Computers and Communication, July 6-9, 2008, Marrakech, Morocco, pp: 934-941.
CrossRef - Hahm, S., Y. Jung, S. Yi, Y. Song, I. Chong and K. Lim, 2005. A self-organized authentication architecture in mobile ad-hoc networks. Proceedings of the International Conference Information Networking: Convergence in Broadband and Mobile Networking, January 31-February 2, 2005, Jeju Island, Korea, pp: 689-696.
CrossRef - Xiong, Z.G. and X.M. Zhang, 2010. Resource management architecture and genetic ant algorithm for P2P grid system. J. Comput. Inform. Syst., 6: 79-88.
Direct Link - Yu, M., M.C. Zhou and W. Su, 2009. A secure routing protocol against Byzantine attacks for MANETs in adversarial environments. IEEE Trans. Veh. Technol., 58: 449-460.
CrossRef