期刊名称:International Journal of Soft Computing & Engineering
电子版ISSN:2231-2307
出版年度:2013
卷号:2
期号:6
页码:150-153
出版社:International Journal of Soft Computing & Engineering
摘要:Distributed Hash Tables or the DHT is a very crucial and attention seeking topic as far as the field of P2P network overlays is concerned; since the latter has set a new benchmark in the arena of file sharing. The use of DHTs in P2P network involves the cause of file searching within the network. The DHT protocol works by assigning a key to a single P2P function and finds the node or nodes associated to this key thereby completing the request for file search. Other functions involving the retrieval of information and its storage are facilitated by certain higher layers in the P2P network. Through the research made out in the paper, the goal is to find out various security issues related to the process and resolve them according to the routing protocols of the network. The Chord which is a DHT protocol has been taken as the target for research in this paper for certain reasons that will consequently be covered in the following.