Font Size: a A A

Key Technologies Research On DHT-based Identifier Mapping In Universal Network

Posted on:2012-07-12Degree:DoctorType:Dissertation
Country:ChinaCandidate:H K WuFull Text:PDF
GTID:1118330335999415Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The information technology is a great driving force to promote the social develop-ment. With the development of the Internet, there are kinds of new services arising in the current network, and the copy or the migration of the data becomes commonplace now. The user cares about getting the data or the service, docs not care about how to get the data or the service. The host-centered application layer architecture limits the development of the current Internet. In the network layer, the dual properties of IP addresses, acting as identifiers and locators at the same time, cannot support mobility and routing scalability efficiently.In this paper, we propose a data-oriented identifier mapping model in the pervasive layer, to achieve the efficient retrieval of the data and the service. We propose an ID/locator separated mapping model in the infrastructure layer, to support the mobility and routing scalability efficiently. These two mapping models have a lot in common and can be achieved by the same DHT-based mapping system. We also analyze the scalability of the mapping system, and propose mechanisms to protect the mapping system from Sybil attacks. The main contribution of this paper is as follows:(1) In order to resolve the problems of the current host-centered Internet, we propose a data-oriented mapping model in the pervasive layer, which resolves the mi-gration problems of the data and the service, integrates the middleboxes and achieves the efficient retrieval of the data and the service.(2) The current Internet cannot support mobility and routing scalability efficiently. We propose an ID/locator separated mapping model in the infrastructure layer, tak-ing the access identifier (AID) as the ID and taking the routing identifier (RID) as the locator. We use the mapping system to bind AIDs with RIDs. This mechanism can support mobility and routing scalability efficiently, and can also support the flat endpoint identifier.(3) We propose a one-hop DHT based mapping system. We design a fast event dissemination algorithm to update the system when a node joins or leaves the sys-tem. We design a dynamic ID dividing algorithm for good load balance. We design a multicast-based algorithm and a backup mechanism to improve the robustness of the system. We analyze the mapping delay and maintenance overhead of the system, and the results show that the mapping system has good scalability.(4) The distributed mapping system suffers from sybil attacks, so we propose a distributed access control mechanism to fight against sybil attacks. We use client puzzles to limit sybil identifiers, and propose a cut-off window to avoid the problem that an advertiser may take a long time period to introduce unlimited sybil identifiers. We also propose a Bloom filter based social network model to mitigate sybil attacks, which uses Bloom filter to summarize the set of sybil identifiers and disseminates the patterns based on the expander random graph.
Keywords/Search Tags:next generation Internet, universal identifier-based network, identifier mapping, data-oriented, ID/locator separated, scalability, sybil attack
PDF Full Text Request
Related items