SSDHT:social network-based secure DHT mechanism
P2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external attacks such as Sybil attacks.A DHT security enhanc...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2018-11-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018276/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530488598036480 |
---|---|
author | Panpan LI Zhengxia XIE Guangxue YUE Bolin MA Li CHEN Jianhua LIU |
author_facet | Panpan LI Zhengxia XIE Guangxue YUE Bolin MA Li CHEN Jianhua LIU |
author_sort | Panpan LI |
collection | DOAJ |
description | P2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external attacks such as Sybil attacks.A DHT security enhancement mechanism based on social network was proposed,which introduced the trust relationship of nodes in the social network into the DHT network to improve the recognition ability of Sybil nodes.The KAD (Kademlia) algorithm was used as an example to verify the experiment.Experimental results based on Facebook and Twitter datasets show that the proposed security mechanism is suitable for large-scale dynamic networks and can effectively defend against Sybil attacks. |
format | Article |
id | doaj-art-ef5f1f7009e64d959d42db685920345b |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2018-11-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-ef5f1f7009e64d959d42db685920345b2025-01-15T03:03:44ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012018-11-0134102059592772SSDHT:social network-based secure DHT mechanismPanpan LIZhengxia XIEGuangxue YUEBolin MALi CHENJianhua LIUP2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external attacks such as Sybil attacks.A DHT security enhancement mechanism based on social network was proposed,which introduced the trust relationship of nodes in the social network into the DHT network to improve the recognition ability of Sybil nodes.The KAD (Kademlia) algorithm was used as an example to verify the experiment.Experimental results based on Facebook and Twitter datasets show that the proposed security mechanism is suitable for large-scale dynamic networks and can effectively defend against Sybil attacks.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018276/P2Pdistributed hash tablesocial networkSybil attack |
spellingShingle | Panpan LI Zhengxia XIE Guangxue YUE Bolin MA Li CHEN Jianhua LIU SSDHT:social network-based secure DHT mechanism Dianxin kexue P2P distributed hash table social network Sybil attack |
title | SSDHT:social network-based secure DHT mechanism |
title_full | SSDHT:social network-based secure DHT mechanism |
title_fullStr | SSDHT:social network-based secure DHT mechanism |
title_full_unstemmed | SSDHT:social network-based secure DHT mechanism |
title_short | SSDHT:social network-based secure DHT mechanism |
title_sort | ssdht social network based secure dht mechanism |
topic | P2P distributed hash table social network Sybil attack |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018276/ |
work_keys_str_mv | AT panpanli ssdhtsocialnetworkbasedsecuredhtmechanism AT zhengxiaxie ssdhtsocialnetworkbasedsecuredhtmechanism AT guangxueyue ssdhtsocialnetworkbasedsecuredhtmechanism AT bolinma ssdhtsocialnetworkbasedsecuredhtmechanism AT lichen ssdhtsocialnetworkbasedsecuredhtmechanism AT jianhualiu ssdhtsocialnetworkbasedsecuredhtmechanism |