期刊文献+

基于DHT的消息转发防御机制研究

Study of Defense Mechanism for Message Forwarding Based on DHT Model
下载PDF
导出
摘要 DHT(Distributed Hash Tables)是结构化P2P(Peer to Peer)系统实现资源高效组织和定位的关键技术。对DTH系统中消息转发过程中的安全威胁及其解决方法进行了分析。以多路径算法为基础,对消息转发效率和安全性进行优化,提出了一种混合路由防御机制。首先结合迭代路由与递归路由的优点,设计了混合路由方式,保证了消息的转发效率并降低消息开销。然后改进了消息转发过程中的可靠性和消息源鉴别机制。最后,在四川大学校园网内进行了测试。仿真试验结果表明,采用混合路由下的防御机制在减少消息数量的同时提高了查询成功率,对于消息转发过程中的攻击有着较好的防御效果。 Distributed Hash Tables(DHT) is the key technology for structured P2P system to make resources organized and positioned efficiently.The security threats and the corresponding solving methods existing in the message forwarding process of DHT system were analyzed.Based on multi-path method,a defense mechanism with mixed routing was proposed to optimize the forwarding efficiency and safety.Firstly,a mixed routing combined the advantages of iterative and recursive routing was described in detail,which can efficiently forward the message with fewer messages overhead.Secondly,the message reliability and source authentication mechanism were improved to ensure message security in the forwarding process.In addition,the defense mechanism with mixed routing was tested in Sichuan University campus network.The simulation results showed that it has obvious effect on reducing the number of queries and increasing the success rate of forwarding message,which has a better defense effect against the attack in the forward phase.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2011年第6期148-152,共5页 Journal of Sichuan University (Engineering Science Edition)
关键词 DHT 消息转发 路由 防御 DHT message forwarding routing defense mechanism
  • 相关文献

参考文献14

  • 1Stoica I, Morris R, Karger D, et al. Chord : a scalable peer-to- peer lookup service for Internet applications [ J ]. Computer Communication Review ,2001,31 (4) : 149 - 151.
  • 2Fujii T, Ren Yizhi. Security analysis for P2P routing protocol [ C ]. International Conference on Availability, Reliability and Security,2009:899.
  • 3Tan Yunsong,Zheng Zujun. A secure DHT routing scheme in P2P networks [ C ]. 2009 International Conference on E-Busi- ness and Information System Security,2009(5) :2 -3.
  • 4Lua Eng Keong, Jon Crowcroft, Pias M, et al. A survey and comparison of peer-to-peer overlay network schemes [ J ]. Communications Surveys & Tutorials, 2005 (7) : 73 - 78.
  • 5Dury A. Auto-adaptive distributed hash tables [ C ]//The Proceedings IEEE/ACM International Workshop on Grid Computing. 2005:268 - 270.
  • 6Castro M, Druschel P, Ganesh A, et al. Secure routing for structured peer-to-peer overlay networks [ C J//The Proceed- ings of the ACM Symposium on Applied Computing. 2009: 54 - 56.
  • 7Lu Chuiwei. Research of P2P routing security based on posi- tive detection mechanism [ C ]. 2009 IEEE International Con- ference on Networking, Architecture and Storage, 2009 : 273 - 274.
  • 8Xu Xiang, Tan Jin. Efficient secure message routing for structured peer-to-peer systems [ C ]. International Confer- ence on Networks Security, Wireless Communications and Trusted Computing,2009:355 - 356.
  • 9Sit E, Morris R. Security considerations for peer-to-peer dis- tributed hash tables [ C ]//The Proceedings of the 1 ^st Inter- national Workshop on Peer-to-Peer Systems. 2002:261 - 165.
  • 10Chen Zhiyi, Huang Minghe, Tan Qi. The design of Kademlia system base on network topology matching [ C ]. Education Technology and Computer Science ( ETCS ), 2010 Second International Workshop, 2010 ( 2 ) : 147 - 148.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部