SSDHT:social network-based secure DHT mechanism
P2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external attacks such as Sybil attacks.A DHT security enhanc...
Saved in:
Main Authors: | Panpan LI, Zhengxia XIE, Guangxue YUE, Bolin MA, Li CHEN, Jianhua LIU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2018-11-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018276/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Design and Implementation of DHT Algorithm for NDN
by: Kai Lei, et al.
Published: (2014-12-01) -
LEACH protocol based security mechanism for Sybil attack detection
by: CHEN Shan-shan1, et al.
Published: (2011-01-01) -
Novel distributed Hash table——BChord
by: ZHENG Yan1, et al.
Published: (2008-01-01) -
Research on sybil attack in defense blockchain based on improved PBFT algorithm
by: Yingxu LAI, et al.
Published: (2020-09-01) -
Data security for internet plus in public cloud
by: Yongjian WANG, et al.
Published: (2017-10-01)