Open Access Open Access  Restricted Access Subscription Access

Analysis of Routing Attacks in Peer to Peer overlay Networks


Affiliations
1 Department of Computer Science, Arya College of Engineering and IT, Jaipur, India
2 Department of CS, Arya College of Engg. & IT, Kukas, Jaipur, India
 

Peer-to-peer (P2P) systems are distributed systems in which nodes act as peers, such systems are becoming very popular in applications like file sharing. In this kind of architecture, security in each transaction is fundamental requirements. The aim of a Distributed hash tables provides the method for locating resources (generally files) within a P2P network. In this paper our target is to analyze the routing attacks on existing protocols of such networks. Chord is preferred as the target DHT protocol for various causes which will be discussed in the paper. Routing attacks analysis finds the vulnerabilities of existing protocols and anticipates a defense mechanism which is discussed herewith.

Keywords

Routing Attacks, Peer to Peer Overlay Networks.
User
Notifications
Font Size

Abstract Views: 226

PDF Views: 3




  • Analysis of Routing Attacks in Peer to Peer overlay Networks

Abstract Views: 226  |  PDF Views: 3

Authors

Anil Saroliya
Department of Computer Science, Arya College of Engineering and IT, Jaipur, India
Vishal Shrivastava
Department of CS, Arya College of Engg. & IT, Kukas, Jaipur, India

Abstract


Peer-to-peer (P2P) systems are distributed systems in which nodes act as peers, such systems are becoming very popular in applications like file sharing. In this kind of architecture, security in each transaction is fundamental requirements. The aim of a Distributed hash tables provides the method for locating resources (generally files) within a P2P network. In this paper our target is to analyze the routing attacks on existing protocols of such networks. Chord is preferred as the target DHT protocol for various causes which will be discussed in the paper. Routing attacks analysis finds the vulnerabilities of existing protocols and anticipates a defense mechanism which is discussed herewith.

Keywords


Routing Attacks, Peer to Peer Overlay Networks.