SSDHT:social network-based secure DHT mechanism

P2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external attacks such as Sybil attacks.A DHT security enhanc...

Full description

Saved in:
Bibliographic Details
Main Authors: Panpan LI, Zhengxia XIE, Guangxue YUE, Bolin MA, Li CHEN, Jianhua LIU
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2018-11-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018276/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530488598036480
author Panpan LI
Zhengxia XIE
Guangxue YUE
Bolin MA
Li CHEN
Jianhua LIU
author_facet Panpan LI
Zhengxia XIE
Guangxue YUE
Bolin MA
Li CHEN
Jianhua LIU
author_sort Panpan LI
collection DOAJ
description P2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external attacks such as Sybil attacks.A DHT security enhancement mechanism based on social network was proposed,which introduced the trust relationship of nodes in the social network into the DHT network to improve the recognition ability of Sybil nodes.The KAD (Kademlia) algorithm was used as an example to verify the experiment.Experimental results based on Facebook and Twitter datasets show that the proposed security mechanism is suitable for large-scale dynamic networks and can effectively defend against Sybil attacks.
format Article
id doaj-art-ef5f1f7009e64d959d42db685920345b
institution Kabale University
issn 1000-0801
language zho
publishDate 2018-11-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-ef5f1f7009e64d959d42db685920345b2025-01-15T03:03:44ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012018-11-0134102059592772SSDHT:social network-based secure DHT mechanismPanpan LIZhengxia XIEGuangxue YUEBolin MALi CHENJianhua LIUP2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external attacks such as Sybil attacks.A DHT security enhancement mechanism based on social network was proposed,which introduced the trust relationship of nodes in the social network into the DHT network to improve the recognition ability of Sybil nodes.The KAD (Kademlia) algorithm was used as an example to verify the experiment.Experimental results based on Facebook and Twitter datasets show that the proposed security mechanism is suitable for large-scale dynamic networks and can effectively defend against Sybil attacks.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018276/P2Pdistributed hash tablesocial networkSybil attack
spellingShingle Panpan LI
Zhengxia XIE
Guangxue YUE
Bolin MA
Li CHEN
Jianhua LIU
SSDHT:social network-based secure DHT mechanism
Dianxin kexue
P2P
distributed hash table
social network
Sybil attack
title SSDHT:social network-based secure DHT mechanism
title_full SSDHT:social network-based secure DHT mechanism
title_fullStr SSDHT:social network-based secure DHT mechanism
title_full_unstemmed SSDHT:social network-based secure DHT mechanism
title_short SSDHT:social network-based secure DHT mechanism
title_sort ssdht social network based secure dht mechanism
topic P2P
distributed hash table
social network
Sybil attack
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018276/
work_keys_str_mv AT panpanli ssdhtsocialnetworkbasedsecuredhtmechanism
AT zhengxiaxie ssdhtsocialnetworkbasedsecuredhtmechanism
AT guangxueyue ssdhtsocialnetworkbasedsecuredhtmechanism
AT bolinma ssdhtsocialnetworkbasedsecuredhtmechanism
AT lichen ssdhtsocialnetworkbasedsecuredhtmechanism
AT jianhualiu ssdhtsocialnetworkbasedsecuredhtmechanism