期刊文献+

一种基于多维DHT空间映射的P2P安全拓扑方案 被引量:2

Secure P2P topology based on a multidimensional DHT space mapping
原文传递
导出
摘要 基于DHT(distributed Hash table)的分布式检索和路由算法凭借其良好的分布性、自组织性、可扩展性等优点,正成为国际上结构化P2P(peer-to-peer)网络研究和应用的热点.但相对于传统的C/S(client/server)网络,P2P网络的非中心化特点以及网络中节点较强的自治性和动态性,使得节点实施恶意行为的可能性大大增加,这令DHT对节点安全性的要求很难得到满足.本文提出了一种基于多维映射机制的安全DHT协议,该机制通过对标识符进行按组划分,将P2P网络中的节点映射到一个多维空间,并通过设计合理的路由算法,使安全工作定位到相对简单的节点区域内进行.理论分析和实验结果表明,本机制能够简化现有DHT安全机制,有效抑制恶意路由行为,提高资源搜索成功率. Distributed search and routing algorithms based on the DHT (distributed Hash table) protocol have attracted considerable attention in structured P2P (peer-to-peer) research as a result of favorable properties such as distribution, self-organization, and high scalability. Compared with a traditional C/S (client/server) network, tile probability of peers initiating malicious behavior increases dramatically because of their self-gow-'rning and dynamic characteristics, which also make it harder to satisfy the peers' security required by DHT. In this paper, we propose a new secure DHT protocol based on a multidimensional mapping nmchanism. This mechanism nmps peers to a multidimensional space by dividing the identifiers into groups. Moreover, a series of secure methods and routing algorithms are provided to achieve secure DHT in smaller spaces. Compared with state-of-the-art approaches, the theoretical analysis and experiinental results show that the multidimensional mappillg mechanism can effectively improve the average success rate of a resource search by inhibiting malicious behavior.
出处 《中国科学:信息科学》 CSCD 2013年第3期343-360,共18页 Scientia Sinica(Informationis)
基金 国家自然科学基金(批准号:60973140 61170276) 江苏省高校自然科学研究重大项目(批准号:12KJA520003)资助
关键词 多维映射 分布式Hash表 结构化P2P网络 路由攻击 安全 multidimensional mapping, DHT (distributed Hash table), structured P2P (peer-to-peer) network,routing attack, security
  • 相关文献

参考文献2

二级参考文献19

  • 1王晓燕.CtoC电子商务中的信任问题:一个进化博弈分析模型[J].商业研究,2005(6):179-181. 被引量:22
  • 2Sulin B,Andrew B W,Han Z.The dynamics of the electronic market:an evolutionary game approach[J].Information System Frontiers,2000,2 : 31-40.
  • 3Sepandar D K,Mario T S,Hector G.The eigenTrust algorithm for reputation management in P2P networks[C]//12th International World Wide Web Conference.Budapest:ACM Press , 2003 :123-134.
  • 4Li Xiong,Ling Liu.PeerTrust:supporting reputation-based trust for peer-to-peer electronic communities[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(7).
  • 5Hahm Seongil,Jung Yongjae,Yi Seunghee,et al.A self-organized authentication architecture in mobile ad-hoc networks[C]//International Conference on Information Networking.Jeju Island,South Korea,2005,3391:689-696.
  • 6Luo H Y,Lu S W.Ubiquitous and robust authentication services for ad hoc wireless networks,UCLA-CSDTR-200030[R].Los Angeles:University of California,2000.
  • 7Narasimha M,Tsudik G,Yi J H.On the utility of distributed cryptography in P2P and mantes:the case of membership control[C]//The 11th IEEE International Conference on Network Protocols.Atlanta,Georgia,USA,2003:336-345.
  • 8Gokhale S,Dasgupta P.Distributed authentication for peer-to-peer networks[C]//Applications and the Internet Workshops.Orlando,FL,USA,2003:347-353.
  • 9Camenisch J,Lysyanskaya A.Dynamic accumulators and application to efficient revocation of anonymous credentials[C]//Advance in Cryptology-CRYPTO 2002.Santa Barbara,California,USA,2002,2442:61-76.
  • 10Benaloh J,de Mare Michael.One way accumulators:a decentralized alternative to digital signatures[C]//Advances in Cryptology-Proceedings of Eurocrypt93.Springer-Verlag,1993:274-285.

共引文献14

同被引文献10

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部