Font Size: a A A

Research And Implement Of Secure Active Routing Service System In P2P Environment

Posted on:2007-03-15Degree:MasterType:Thesis
Country:ChinaCandidate:H SuFull Text:PDF
GTID:2178360212465601Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of network technology, the Client -Server network can no longer fulfil people's demands such as communicating with each other, sharing files, sharing computing resources as well. However, peer-to-peer systems can achieve these functions better than traditional networks. People can communicate and share resources with each other by the manner of peer-to-peer, which not only mitigates the burden of server, but also upgades the communicate efficiency.Peer-to-peer systems have many security issues even they have been widely used. We can devide security issues of P2P systems as follows: the security issues of the sharing characteristics; vicious attacks from middle node; vicious attacks aiming at hidden troubles of P2P systems; vicious attacks of distributed denial of service. In peer-to-peer systems the data should be transferred through several middle nodes, so vicious attack from middle node is most harmful. These kinds of attacks include wiretapping attack, juggling attack, routing malfunction, routing redirection and bridge attack. Today many applicable peer-to-peer systems still have many other security issues. This article provides a novel multi-path routing protocol based on trust model towards the vicious behaviors of middle nodes. This article achieves selecting trustworthy nodes in routing strategy by the trust computing of the neighbor nodes. It achieves the changing of routing strategy based on different network environments by random multi-path routing. It decreases the relativity of the transferred packets by disparting and assembling the packets in data transferring courses. It enhances the active security performance by the using of the previous mechanismes and introducing the data encryption and data signature algorithm to the system. Based on the simulation of our prototype system, we can draw a conclusion that the model can restrain the vicious behaviors of middle nodes effectively. The vicious behaviors include wiretapping attack, juggling attack, routing malfunction, routing redirection and bridge attack. The system can also achieve sender anonymity and decrease the ratio of vicious node appearing in a path. The system enhances the systme security performance by combining the trust model, multi-path routing protocol and encrpytion tachniques together.The main contributions of this article can be described as follows:(1) This article provides a novel trust model in peer-to-peer systems. The trust model uses the sender evaluat mode and the receiver evaluat mode. System calculates the trust value by the results of the data transfer.(2) This article provides a novel dynamic multi-path routing protocol. In the protocol, sender can select several different paths to transfer data simultaneously, which enhances the uncertainty of the data transfer.(3) The system introduces the encryption technology to peer-to-peer data transfer services, which enhances the security performance of the data transfer.(4) The system achieves active routing service based on trust strategies by combining the tust model, multi-path routing protocol and encrpytion tachniques together. The system is a novel active secure system.
Keywords/Search Tags:Peer to peer, Routing, Multi-path, Security, Trust, Encryption, Decryption
PDF Full Text Request
Related items