Open Access
Subscription Access
Analysis of Routing Attacks in Peer to Peer overlay Networks
Peer-to-peer (P2P) systems are distributed systems in which nodes act as peers, such systems are becoming very popular in applications like file sharing. In this kind of architecture, security in each transaction is fundamental requirements. The aim of a Distributed hash tables provides the method for locating resources (generally files) within a P2P network. In this paper our target is to analyze the routing attacks on existing protocols of such networks. Chord is preferred as the target DHT protocol for various causes which will be discussed in the paper. Routing attacks analysis finds the vulnerabilities of existing protocols and anticipates a defense mechanism which is discussed herewith.
Keywords
Routing Attacks, Peer to Peer Overlay Networks.
User
Font Size
Information
Abstract Views: 226
PDF Views: 3