Filters








7,693 Hits in 3.7 sec

Designing Less-Structured P2P Systems for the Expected High Churn

F.E. Bustamante, Y. Qiao
2008 IEEE/ACM Transactions on Networking  
We address the problem of highly transient populations in unstructured and loosely-structured peer-to-peer systems.  ...  characteristics more resilient to the natural instability of their environments.  ...  ACKNOWLEDGMENTS We would like to thank NUIT and our Computing Support Group for their aid and understanding while obtaining the trace data used for our experiments.  ... 
doi:10.1109/tnet.2007.903986 fatcat:4eefknqtrzeido62vtryougzoq

A churn and mobility resistant approach for DHTs

Olaf Landsiedel, Stefan Götz, Klaus Wehrle
2006 Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking - MobiShare '06  
In contrast to existing DHTs, MHT does not to maintain routing tables and thereby can be used in networks with highly dynamic topologies.  ...  However, node mobility and the continually changing physical topology pose a special challenge to scalability and the design of a DHT for mobile ad-hoc network.  ...  Orion [13] deploys an unstructured peer-to-peer network on top of a ad-hoc routing protocol.  ... 
doi:10.1145/1161252.1161263 dblp:conf/mobicom/LandsiedelGW06 fatcat:cadqfahhz5aptlxepl2lxvdgwu

Denial-of-service resilience in peer-to-peer file sharing systems

D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, W. Zwaenepoel
2005 Performance Evaluation Review  
In network-targeted attacks, attackers respond to queries for any file with erroneous information.  ...  Peer-to-peer (p2p) file sharing systems are characterized by highly replicated content distributed among nodes with enormous aggregate resources for storage and communication.  ...  INTRODUCTION Peer-to-peer (p2p) file sharing networks can be subjected to intense Denial-of-Service (DoS) attacks.  ... 
doi:10.1145/1071690.1064218 fatcat:iugi3wn6pzaylbqkvcjxd3atc4

A Resilient P2P Architecture for Mobile Resource Sharing

Khalid Elgazzar, Sharief M. A. Oteafy, Walid M. Ibrahim, Hossam S. Hassanein
2014 Computer journal  
Peer-to-peer (P2P) systems present a unique medium for resource sharing among cliques of participants (peers) in a distributed and self-organized manner.  ...  Our results illustrate the efficiency of RobP2P, its resilience to failures, and the improvements in lowering overhead traffic while reliably maintaining the consistency of network state.  ...  P2P systems aim to utilize selforganizing protocols, capable of maintaining a consistent state despite dynamic changes in network topology and number of peers.  ... 
doi:10.1093/comjnl/bxu056 fatcat:cqp7kddofnhbfgz2wv5l573tf4

ELiSyR: Efficient, Lightweight and Sybil-Resilient File Search in P2P Networks

Hyeong S. Kim
2010 KSII Transactions on Internet and Information Systems  
Peer-to-peer (P2P) networks consume the most bandwidth in the current Internet and file sharing accounts for the majority of the P2P traffic.  ...  ELiSyR uses social networks for P2P file search and finds benign files in 71% of searches even when more than half of the users are malicious.  ...  For safe file search and Sybil resilience, we use social network as our search network: every search query is forwarded to selected neighbors on social network.  ... 
doi:10.3837/tiis.2010.12.019 fatcat:zxg7tz2wyzcq7dt2egdjmmakhm

A Survey on Routing in Anonymous Communication Protocols

Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar, Michael Backes, Claudia Diaz
2018 ACM Computing Surveys  
The present survey includes various attacks and its corresponding protocols used for mitigating anonymous communication in MANETs.  ...  MANETs have grown to be a challenging and attracting choice for disaster-response and military operations.  ...  B.MANET Anonymous Peer-to-peer Communication Protocol In [2] Chao-Chin presented MANET Anonymous Peer-to-peer Communication Protocol (MAPCP), for peer to peer applications over mobile ad-hoc networks  ... 
doi:10.1145/3182658 fatcat:mu2znclbh5g7jj5253vke5iila

A survey and comparison of peer-to-peer overlay network schemes

Eng Keong Lua, J. Crowcroft, M. Pias, R. Sharma, S. Lim
2005 IEEE Communications Surveys and Tutorials  
Keys are mapped by the overlay network protocol to a unique live peer in the overlay network.  ...  There has been much interest in emerging Peer-to-Peer (P2P) network overlays because they provide a good substrate for creating large-scale data sharing, content distribution, and application-level multicast  ...  ACKNOWLEDGMENT The authors would like to thank the reviewers for their valuable comments.  ... 
doi:10.1109/comst.2005.1610546 fatcat:wbzstyu4yzddfbw4zmu5r3yzxm

SPac

Angela Bonifati, Hui (Wendy) Wang, Ruilin Liu
2010 Proceedings of the 19th ACM international conference on Information and knowledge management - CIKM '10  
Such a language guarantees the fine-grained access to the data, (ii) a fully-decentralized authorization that relies on classic cryptographic protocols to provide robust and resilient key-based encryption  ...  for access control enforcement, and (iii) an update-friendly access control mechanism, that also addresses the updates on both the network and the access control policies.  ...  protocol.  ... 
doi:10.1145/1871437.1871781 dblp:conf/cikm/BonifatiWL10 fatcat:vnrjdnywkraxvmdguirfbwyfeq

LLR: A Construction Scheme of a Low-Diameter, Location-Aware, and Resilient P2P Network

Masahiro Sasabe, Naoki Wakamiya, Masayuki Murata
2006 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing  
Since a peer searches for its desired file in a P2P file sharing system, the structure of an overlay network determines the effectiveness of search.  ...  LLR has a rewiring method to improve the structure of an overlay network and a recovery method to cope with disappearance of peers.  ...  In addition, a malicious user may attack to some of peers highly connected to other peers to fragment the network [14] .  ... 
doi:10.1109/colcom.2006.361863 dblp:conf/colcom/SasabeWM06 fatcat:mkgx7sratfcdtgxuahtfcncigi

Denial-of-service resilience in peer-to-peer file sharing systems

D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, W. Zwaenepoel
2005 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems - SIGMETRICS '05  
In network-targeted attacks, attackers respond to queries for any file with erroneous information.  ...  Peer-to-peer (p2p) file sharing systems are characterized by highly replicated content distributed among nodes with enormous aggregate resources for storage and communication.  ...  INTRODUCTION Peer-to-peer (p2p) file sharing networks can be subjected to intense Denial-of-Service (DoS) attacks.  ... 
doi:10.1145/1064212.1064218 dblp:conf/sigmetrics/DumitriuKKSZ05 fatcat:ncdyzlit5bd7bee4sezxaoztxe

Challenges and Approaches in Large-Scale P2P Media Streaming

W.-P. Ken Yiu, Xing Jin, S.-H. Gary Chan
2007 IEEE Multimedia  
The simplest delivery technique for such applications is to allocate server and network resources for each client request.  ...  Peer-to-peer technologies have emerged as a powerful and popular paradigm for many scalable applications, such as multicasting and file sharing among users all over the world (for example, see http://www.bittorrent.com  ...  The control protocol for overlay maintenance hence must be resilient to node failure.  ... 
doi:10.1109/mmul.2007.30 fatcat:ntvwlb6uffectid3ypauc7zwka

An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks

Chao-Chin Chou, D.S.L. Wei, C.-C.J. Kuo, K. Naik
2007 IEEE Journal on Selected Areas in Communications  
MAPCP establishes multiple anonymous paths between communication peers within a single query phase, and is highly resilient to node mobility, failure, and malicious attacks.  ...  We present the MANET Anonymous Peer-to-peer Communication Protocol (MAPCP), which serves as an efficient anonymous communication protocol for P2P applications over MANET.  ...  The packet delivery fraction and end-to-end delay in (a)(b) the 700m-by-700m field and (c)(d) the 1000m-by-1000m field. (a) (b) (c) (d)  ... 
doi:10.1109/jsac.2007.070119 fatcat:zayxzy5fbbgllnftmrd2iafvwa

CoQUOS: Lightweight Support for Continuous Queries in Unstructured Overlays

Lakshmish Ramaswamy, Jianxia Chen, Piyush Parate
2007 2007 IEEE International Parallel and Distributed Processing Symposium  
to enable the peers to register their queries and receive notifications when corresponding data-items are added to the network and a means for the peers to advertise their new content.  ...  This mechanism includes two novel components, namely cluster resilient random walk algorithm for propagating query to various regions of the network and dynamic probability-based query registration technique  ...  The query TTLs of the continuous queries are set to 50 for the power law network and to 25 for random network.  ... 
doi:10.1109/ipdps.2007.370301 dblp:conf/ipps/RamaswamyCP07 fatcat:7wkjmidc5zev7otwuknaop2aji

Search Methods in P2P Networks: A Survey [chapter]

German Sakaryan, Markus Wulff, Herwig Unger
2006 Lecture Notes in Computer Science  
The peer-to-peer (P2P) file sharing applications have gained a tremendous popularity and now they have millions of users worldwide, since they were introduced in 1999.  ...  Due to chaotic structure, achieved scale and network dynamics, they mostly employ a flooding-based search to locate required files and therefore they are the main source of Internet traffic.  ...  Query Routing Protocol (QRP) [16] proposes to make informed search instead of network flooding.  ... 
doi:10.1007/11553762_6 fatcat:lr3hydn5wjedblje66cspecfgm

Self-protection in P2P Networks: Choosing the Right Neighbourhood [chapter]

Ivan Martinovic, Christof Leng, Frank A. Zdarsky, Andreas Mauthe, Ralf Steinmetz, Jens B. Schmitt
2006 Lecture Notes in Computer Science  
To quantify the impact of our proposed scheme, we implement a simple protocol in a fully unstructured peer-to-peer network.  ...  In unstructured peer-to-peer networks, as in real life, a good neighbourhood is not only crucial for a peaceful sleep, but also for an exchange of important gossips and for finding good service.  ...  We model our peer-to-peer network as a basic Gnutella network [12] without any structure and extend it only by a simple protocol we call Simple Trust Exchange Protocol (STEP), which enables peers to  ... 
doi:10.1007/11822035_4 fatcat:modg4prgfzc6xlme2jlxrmqdlm
« Previous Showing results 1 — 15 out of 7,693 results