DocumentCode :
1929896
Title :
Investigation analysis to find the security vulnerabilities in DHT oriented peer to peer network
Author :
Saroliya, Anil
Author_Institution :
Dept. of CS, AMITY Univ., Jaipur, India
fYear :
2010
fDate :
28-30 Oct. 2010
Firstpage :
190
Lastpage :
193
Abstract :
DHT based routing protocols are very exciting innovative aspects in the area of P2P overlay networks; this kind of networks are appropriate and accepted especially in file sharing like transactions. The reason of the Distributed Hash Table is giving the way to search the resources (mostly files) inside the P2P network. A DHT protocol typically provides a single function to the P2P application: given a key, find the node (s) responsible for that key. All other functions (such as actually retrieving the resource or storing the resource on the node responsible for it) are provided by higher layers of the P2P application. In this paper the main concentration is moving towards to find the security vulnerabilities and determine them on presented routing protocols of such networks. The Chord protocol is preferred as the routing protocol for the variety of motives; those motives are covered in this paper.
Keywords :
computer network security; cryptography; peer-to-peer computing; routing protocols; DHT based routing protocols; DHT oriented peer to peer network; P2P overlay networks; chord protocol; distributed hash table; file sharing; security vulnerabilities; Fingers; Grid computing; Peer to peer computing; Routing; Routing protocols; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on
Conference_Location :
Solan
Print_ISBN :
978-1-4244-7675-6
Type :
conf
DOI :
10.1109/PDGC.2010.5679891
Filename :
5679891
Link To Document :
بازگشت