A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Designing Less-Structured P2P Systems for the Expected High Churn
2008
IEEE/ACM Transactions on Networking
We address the problem of highly transient populations in unstructured and loosely-structured peer-to-peer systems. ...
characteristics more resilient to the natural instability of their environments. ...
ACKNOWLEDGMENTS We would like to thank NUIT and our Computing Support Group for their aid and understanding while obtaining the trace data used for our experiments. ...
doi:10.1109/tnet.2007.903986
fatcat:4eefknqtrzeido62vtryougzoq
A churn and mobility resistant approach for DHTs
2006
Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking - MobiShare '06
In contrast to existing DHTs, MHT does not to maintain routing tables and thereby can be used in networks with highly dynamic topologies. ...
However, node mobility and the continually changing physical topology pose a special challenge to scalability and the design of a DHT for mobile ad-hoc network. ...
Orion [13] deploys an unstructured peer-to-peer network on top of a ad-hoc routing protocol. ...
doi:10.1145/1161252.1161263
dblp:conf/mobicom/LandsiedelGW06
fatcat:cadqfahhz5aptlxepl2lxvdgwu
Denial-of-service resilience in peer-to-peer file sharing systems
2005
Performance Evaluation Review
In network-targeted attacks, attackers respond to queries for any file with erroneous information. ...
Peer-to-peer (p2p) file sharing systems are characterized by highly replicated content distributed among nodes with enormous aggregate resources for storage and communication. ...
INTRODUCTION Peer-to-peer (p2p) file sharing networks can be subjected to intense Denial-of-Service (DoS) attacks. ...
doi:10.1145/1071690.1064218
fatcat:iugi3wn6pzaylbqkvcjxd3atc4
A Resilient P2P Architecture for Mobile Resource Sharing
2014
Computer journal
Peer-to-peer (P2P) systems present a unique medium for resource sharing among cliques of participants (peers) in a distributed and self-organized manner. ...
Our results illustrate the efficiency of RobP2P, its resilience to failures, and the improvements in lowering overhead traffic while reliably maintaining the consistency of network state. ...
P2P systems aim to utilize selforganizing protocols, capable of maintaining a consistent state despite dynamic changes in network topology and number of peers. ...
doi:10.1093/comjnl/bxu056
fatcat:cqp7kddofnhbfgz2wv5l573tf4
ELiSyR: Efficient, Lightweight and Sybil-Resilient File Search in P2P Networks
2010
KSII Transactions on Internet and Information Systems
Peer-to-peer (P2P) networks consume the most bandwidth in the current Internet and file sharing accounts for the majority of the P2P traffic. ...
ELiSyR uses social networks for P2P file search and finds benign files in 71% of searches even when more than half of the users are malicious. ...
For safe file search and Sybil resilience, we use social network as our search network: every search query is forwarded to selected neighbors on social network. ...
doi:10.3837/tiis.2010.12.019
fatcat:zxg7tz2wyzcq7dt2egdjmmakhm
A Survey on Routing in Anonymous Communication Protocols
2018
ACM Computing Surveys
The present survey includes various attacks and its corresponding protocols used for mitigating anonymous communication in MANETs. ...
MANETs have grown to be a challenging and attracting choice for disaster-response and military operations. ...
B.MANET Anonymous Peer-to-peer Communication Protocol In [2] Chao-Chin presented MANET Anonymous Peer-to-peer Communication Protocol (MAPCP), for peer to peer applications over mobile ad-hoc networks ...
doi:10.1145/3182658
fatcat:mu2znclbh5g7jj5253vke5iila
A survey and comparison of peer-to-peer overlay network schemes
2005
IEEE Communications Surveys and Tutorials
Keys are mapped by the overlay network protocol to a unique live peer in the overlay network. ...
There has been much interest in emerging Peer-to-Peer (P2P) network overlays because they provide a good substrate for creating large-scale data sharing, content distribution, and application-level multicast ...
ACKNOWLEDGMENT The authors would like to thank the reviewers for their valuable comments. ...
doi:10.1109/comst.2005.1610546
fatcat:wbzstyu4yzddfbw4zmu5r3yzxm
Such a language guarantees the fine-grained access to the data, (ii) a fully-decentralized authorization that relies on classic cryptographic protocols to provide robust and resilient key-based encryption ...
for access control enforcement, and (iii) an update-friendly access control mechanism, that also addresses the updates on both the network and the access control policies. ...
protocol. ...
doi:10.1145/1871437.1871781
dblp:conf/cikm/BonifatiWL10
fatcat:vnrjdnywkraxvmdguirfbwyfeq
LLR: A Construction Scheme of a Low-Diameter, Location-Aware, and Resilient P2P Network
2006
2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing
Since a peer searches for its desired file in a P2P file sharing system, the structure of an overlay network determines the effectiveness of search. ...
LLR has a rewiring method to improve the structure of an overlay network and a recovery method to cope with disappearance of peers. ...
In addition, a malicious user may attack to some of peers highly connected to other peers to fragment the network [14] . ...
doi:10.1109/colcom.2006.361863
dblp:conf/colcom/SasabeWM06
fatcat:mkgx7sratfcdtgxuahtfcncigi
Denial-of-service resilience in peer-to-peer file sharing systems
2005
Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems - SIGMETRICS '05
In network-targeted attacks, attackers respond to queries for any file with erroneous information. ...
Peer-to-peer (p2p) file sharing systems are characterized by highly replicated content distributed among nodes with enormous aggregate resources for storage and communication. ...
INTRODUCTION Peer-to-peer (p2p) file sharing networks can be subjected to intense Denial-of-Service (DoS) attacks. ...
doi:10.1145/1064212.1064218
dblp:conf/sigmetrics/DumitriuKKSZ05
fatcat:ncdyzlit5bd7bee4sezxaoztxe
Challenges and Approaches in Large-Scale P2P Media Streaming
2007
IEEE Multimedia
The simplest delivery technique for such applications is to allocate server and network resources for each client request. ...
Peer-to-peer technologies have emerged as a powerful and popular paradigm for many scalable applications, such as multicasting and file sharing among users all over the world (for example, see http://www.bittorrent.com ...
The control protocol for overlay maintenance hence must be resilient to node failure. ...
doi:10.1109/mmul.2007.30
fatcat:ntvwlb6uffectid3ypauc7zwka
An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks
2007
IEEE Journal on Selected Areas in Communications
MAPCP establishes multiple anonymous paths between communication peers within a single query phase, and is highly resilient to node mobility, failure, and malicious attacks. ...
We present the MANET Anonymous Peer-to-peer Communication Protocol (MAPCP), which serves as an efficient anonymous communication protocol for P2P applications over MANET. ...
The packet delivery fraction and end-to-end delay in (a)(b) the 700m-by-700m field and (c)(d) the 1000m-by-1000m field.
(a) (b) (c) (d) ...
doi:10.1109/jsac.2007.070119
fatcat:zayxzy5fbbgllnftmrd2iafvwa
CoQUOS: Lightweight Support for Continuous Queries in Unstructured Overlays
2007
2007 IEEE International Parallel and Distributed Processing Symposium
to enable the peers to register their queries and receive notifications when corresponding data-items are added to the network and a means for the peers to advertise their new content. ...
This mechanism includes two novel components, namely cluster resilient random walk algorithm for propagating query to various regions of the network and dynamic probability-based query registration technique ...
The query TTLs of the continuous queries are set to 50 for the power law network and to 25 for random network. ...
doi:10.1109/ipdps.2007.370301
dblp:conf/ipps/RamaswamyCP07
fatcat:7wkjmidc5zev7otwuknaop2aji
Search Methods in P2P Networks: A Survey
[chapter]
2006
Lecture Notes in Computer Science
The peer-to-peer (P2P) file sharing applications have gained a tremendous popularity and now they have millions of users worldwide, since they were introduced in 1999. ...
Due to chaotic structure, achieved scale and network dynamics, they mostly employ a flooding-based search to locate required files and therefore they are the main source of Internet traffic. ...
Query Routing Protocol (QRP) [16] proposes to make informed search instead of network flooding. ...
doi:10.1007/11553762_6
fatcat:lr3hydn5wjedblje66cspecfgm
Self-protection in P2P Networks: Choosing the Right Neighbourhood
[chapter]
2006
Lecture Notes in Computer Science
To quantify the impact of our proposed scheme, we implement a simple protocol in a fully unstructured peer-to-peer network. ...
In unstructured peer-to-peer networks, as in real life, a good neighbourhood is not only crucial for a peaceful sleep, but also for an exchange of important gossips and for finding good service. ...
We model our peer-to-peer network as a basic Gnutella network [12] without any structure and extend it only by a simple protocol we call Simple Trust Exchange Protocol (STEP), which enables peers to ...
doi:10.1007/11822035_4
fatcat:modg4prgfzc6xlme2jlxrmqdlm
« Previous
Showing results 1 — 15 out of 7,693 results