期刊名称:Oriental Journal of Computer Science and Technology
印刷版ISSN:0974-6471
出版年度:2010
卷号:3
期号:2
页码:349-353
语种:English
出版社:Oriental Scientific Publishing Company
摘要:Peer-to-peer (P2P) systems are distributed systems in which nodes act as peers, such systems are becoming very popular in applications like file sharing. In this kind of architecture, security in each transaction is fundamental requirements. The aim of a Distributed hash tables provides the method for locating resources (generally files) within a P2P network. In this paper our target is to analyze the routing attacks on existing protocols of such networks. Chord is preferred as the target DHT protocol for various causes which will be discussed in the paper. Routing attacks analysis finds the vulnerabilities of existing protocols and anticipates a defense mechanism which is discussed herewith.
关键词:Routing attacks ; peer to peer overlay networks