期刊文献+

P2P网络的准入控制方案 被引量:2

An admission control scheme for P2P Networks
下载PDF
导出
摘要 提出了一个P2P网络的准入控制方案。该方案不仅能根据安全需求对节点进行资格审核,屏蔽掉一些不符合安全要求的节点,而且能抵抗Kim等人方案中存在的Sybil攻击和合谋攻击。此外,该方案还具有当节点进入P2P网络后,如有恶意行为,网络能剔除这些恶意节点等特性。 An admission control scheme for P2P networks is proposed in this paper. The scheme not only can audit a new node according to secure requirements and eliminate undesired nodes for P2P networks, hut also withstand Syhil attack and conspiracy attack that exited in Kim et al's schemes. Furthermore, when a node's malicious actions are found in P2P networks, the malicious nodes would be revoked out from P2P networks.
作者 王晓明
出处 《微计算机信息》 北大核心 2007年第03X期52-53,共2页 Control & Automation
基金 广州省自然科学基金(04300708) 暨南大学自然科学基金(0521)
关键词 P2P网络 准入控制 合谋攻击 Peer-to-Peer, Admission control, Sybil attack, Conspiracy attack.
  • 相关文献

参考文献5

  • 1Kim Y,Mazzocchi D,Tsudik G.Admission Control in Peer Groups.In:IEEE International Symposium on Network Computing and Applications.Cambridge,MA USA.2003:131-139.
  • 2Narasimha M.,Tsudik G.,Yi J H.On the Utility of Distributed Cryptography in P2P and MANETs:The Case of Membership Control.In:IEEE 11th International Conference on Network Protocol.Atlanta,Georgia,USA.2003:336-345.
  • 3Saxena N.,Tsudik G.,Yi J H.Admission Control in Peer-to-Peer.Design and Performance Evaluation.In:ACM Workshop on Security of AD Hoc and Sensor Network..Fairfax VA,USA.2003:104-114.
  • 4J.Douceur.The Sybil Attack.In Proceedings of the of the 1st International Workshop on Peer-to-Peer Systems (IPTPS),2002:
  • 5冯坤,段立,察豪.移动Ad-hoc网络安全分析综述[J].微计算机信息,2006,22(02X):50-53. 被引量:6

二级参考文献3

  • 1龙银香.一种新的漏洞检测系统方案[J].微计算机信息,2005,21(5):228-229. 被引量:12
  • 2P.Michiardi,R.Molva,Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks,in proceeding of European wireless Conference,2002.
  • 3Y-C Hu,A.Perrig,D.B.Johnson,Ariadne:A secure OnDemand Routing Protocol for Ad Hoc Net.

共引文献5

同被引文献18

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部