SSDHT:social network-based secure DHT mechanism

P2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external attacks such as Sybil attacks.A DHT security enhanc...

Full description

Saved in:
Bibliographic Details
Main Authors: Panpan LI, Zhengxia XIE, Guangxue YUE, Bolin MA, Li CHEN, Jianhua LIU
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2018-11-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/thesisDetails#10.11959/j.issn.1000-0801.2018276
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850214604129435648
author Panpan LI
Zhengxia XIE
Guangxue YUE
Bolin MA
Li CHEN
Jianhua LIU
author_facet Panpan LI
Zhengxia XIE
Guangxue YUE
Bolin MA
Li CHEN
Jianhua LIU
author_sort Panpan LI
collection DOAJ
description P2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external attacks such as Sybil attacks.A DHT security enhancement mechanism based on social network was proposed,which introduced the trust relationship of nodes in the social network into the DHT network to improve the recognition ability of Sybil nodes.The KAD (Kademlia) algorithm was used as an example to verify the experiment.Experimental results based on Facebook and Twitter datasets show that the proposed security mechanism is suitable for large-scale dynamic networks and can effectively defend against Sybil attacks.
format Article
id doaj-art-2bec2d205af14003b3a43a68af5c061f
institution OA Journals
issn 1000-0801
language zho
publishDate 2018-11-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-2bec2d205af14003b3a43a68af5c061f2025-08-20T02:08:50ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012018-11-0134102059592772SSDHT:social network-based secure DHT mechanismPanpan LIZhengxia XIEGuangxue YUEBolin MALi CHENJianhua LIUP2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external attacks such as Sybil attacks.A DHT security enhancement mechanism based on social network was proposed,which introduced the trust relationship of nodes in the social network into the DHT network to improve the recognition ability of Sybil nodes.The KAD (Kademlia) algorithm was used as an example to verify the experiment.Experimental results based on Facebook and Twitter datasets show that the proposed security mechanism is suitable for large-scale dynamic networks and can effectively defend against Sybil attacks.http://www.telecomsci.com/thesisDetails#10.11959/j.issn.1000-0801.2018276P2P;distributed hash table;social network;Sybil attack
spellingShingle Panpan LI
Zhengxia XIE
Guangxue YUE
Bolin MA
Li CHEN
Jianhua LIU
SSDHT:social network-based secure DHT mechanism
Dianxin kexue
P2P;distributed hash table;social network;Sybil attack
title SSDHT:social network-based secure DHT mechanism
title_full SSDHT:social network-based secure DHT mechanism
title_fullStr SSDHT:social network-based secure DHT mechanism
title_full_unstemmed SSDHT:social network-based secure DHT mechanism
title_short SSDHT:social network-based secure DHT mechanism
title_sort ssdht social network based secure dht mechanism
topic P2P;distributed hash table;social network;Sybil attack
url http://www.telecomsci.com/thesisDetails#10.11959/j.issn.1000-0801.2018276
work_keys_str_mv AT panpanli ssdhtsocialnetworkbasedsecuredhtmechanism
AT zhengxiaxie ssdhtsocialnetworkbasedsecuredhtmechanism
AT guangxueyue ssdhtsocialnetworkbasedsecuredhtmechanism
AT bolinma ssdhtsocialnetworkbasedsecuredhtmechanism
AT lichen ssdhtsocialnetworkbasedsecuredhtmechanism
AT jianhualiu ssdhtsocialnetworkbasedsecuredhtmechanism