Font Size: a A A

Security, P2p Routing Table Based On The Chord Algorithm

Posted on:2010-12-10Degree:MasterType:Thesis
Country:ChinaCandidate:J LiFull Text:PDF
GTID:2208360278966020Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
After the P2P(peer-to-peer) come up, it develops dramatically, and there are many popular application based on P2P technology, such as IPTV, VOD. From unstructured to structured model, many deductive algorithm of routing and location underlay that improves the scalability and efficiency of application come up. Routing and location is an important section to implement the application of overlay, and section of routing and location includes the initial of routing table, routing and transferring and update of routing table.On unreliable structured P2P network, node keeps connection with a small quantity nodes, which is routing table nodes. The routing table node of Tapestry, Pastry, CAN is Non-exclusive, attacker convince node choosing malicious node as routing table node by forging message. The routing table node of Chord is exclusive, however, node can not identify the authenticity of message, and malicious nodes could send fault messages to befool the correct nodes.Security of routing table and attack impact is evaluated by fraction of malicious node on routing table. To defense the vulnerability of routing table, secure proximity distance is proposed. The expression of attack impact is deduced, and impact of attack is relative to the scale of overlay, the proportion of malicious nodes belonging to each attacker, the secure proximity distance, and the number of attackers. We conclude that the proportion of malicious nodes in the finger table will be higher than the proportion of malicious nodes in the overlay because of finger table attack. Diffusion of attack is another point of this paper. When the capacity of attacker is restricted, there is extreme value for fraction of malicious node on routing table. This paper simulate the variety of fraction of malicious node on finger table under networks churn, when the impact of updating is equal to diffusion of attack, the fraction of routing table is steady.Secure proximity distance is general strategy for routing table security, and it is easy to implement. It is significant to restrict the impact of attack. The expression of attack impact is an important reference to design the security strategy. This paper groundbreaking import the churn parameter, manifest the significance of churn parameter for the security of routing table.
Keywords/Search Tags:Computer network, P2P routing and table, secure proximity distance, churn
PDF Full Text Request
Related items