The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
BitTorrent is a popular application for peer-to-peer file sharing in today's Internet. To achieve robust and efficient data dissemination as an application overlay, BitTorrent implements a data-centric paradigm on top of TCP/IP's point-to-point packet delivery, which requires each peer to obtain network layer connectivity information (e.g., peer IP address, distance to each peer, routing policies)...
Privacy is considered as one of the hottest issues in nowadays communication research areas. It focuses on protecting the content of the transmitted data and on preserving the contextual information such as the identity of the communicating entities. This paper presents an overview of research done in this area in order to build a foundation that helps the research community to understand more the...
Privacy preservation in opportunistic networks, such as disruption and delay tolerant networks, constitutes a very challenging area of research. The wireless channel is vulnerable to malicious nodes that can eavesdrop data exchanges. Moreover, all nodes in an opportunistic network can act as routers and thus, gain access to sensitive information while forwarding data. Node anonymity and data protection...
Some unique attributes of P2P networks such as cost efficiency and scalability, contributed for the widespread adaptation of these networks. Since P2P applications are mostly used in file-sharing, preserving anonymity of users has become a very important subject for researchers. As a result, a lot of methods are suggested for P2P networks to preserve anonymity of users. Most of these methods, by relying...
Fully self-controlled mobile ad hoc networks represent a complex system. Due to the broadcast nature of wireless channel, MANET has many security issues. Especially, Sybil Attack is a very serious threat to the MANET as it creates multiple virtual fake identities per entity, there by affecting the routing table. The multiple virtual identities are obtained by spoofing the victim's node or by creating...
Security problem in MANET has been prevailing even after several researches by the various authors. Since application of security mechanism affects the system performance very much therefore there is always scope for further research in this area. Another major cause is fast technology growth in the area of MANET. Recent researches are focusing on another mechanism of security which involves trust...
Measurements gathered by Smart Meters and collected through the Automatic Metering Infrastructure of Smart Grids can be accessed by numerous external subjects for different purposes, ranging from billing to grid monitoring and management. Therefore, metering data must be securely handled, in order to protect the users' privacy and to prevent the disclosure of personal information through the analysis...
Peer-To-Peer networks have become increasingly common as a means of transferring files over Internet. However, user anonymity and privacy are not typically protected in such peer-to-peer systems. An adversary can gain knowledge about not only the content of the files being transferred but also the senders and receivers of the files. In this paper, we describe the design and experimentation of AnonymP2P...
Recently, in classical P2P overlay networks, with applying replication technique, a single peer is replaced by a cluster of peers in order to tolerant Byzantine failures. In this paper, a novel robust and secure scheme for storage overlay networks is proposed by applying erasure coding technique to reduce redundancy and enhance privacy protection. For achieving a lightweight data privacy protection,...
The Internet of Things is rapidly diffusing, though severe modifications are needed to the current Internet architecture to cope with its new requirements. A major step forward is decoupling the name of an object (identifier) from its physical location (locator), which are both expressed by the IP address currently. We argue that additional advantages can be brought if context metadata are provided...
DHT based routing protocols are very exciting innovative aspects in the area of P2P overlay networks; this kind of networks are appropriate and accepted especially in file sharing like transactions. The reason of the Distributed Hash Table is giving the way to search the resources (mostly files) inside the P2P network. A DHT protocol typically provides a single function to the P2P application: given...
Churn is one of the crucial problems which restrict the development and deployment of DHT networks. In terms of churn treatment, this paper studies the quick start-up bootstrapping mechanism for Kademlia and proposes a heuristic bootstrapping algorithm to overcome the defects of the original. By modifying the way how to populate the routing tables, the heuristic algorithm decreases the messages sent...
Correct routing is a key factor to maintain the stability and efficiency of P2P network. There are many types of attacks aiming at P2P routing, which seriously threats the security of P2P network. We proposed an improved routing algorithm based on asymmetric nested encryption detection. The algorithm can periodically inspect every node in routing path, and eliminate bad nodes and instable nodes in...
Network coding is a class of routing algorithms offering increased throughput and improved robustness to random failures. With traditional routing, intermediate nodes in the network may only forward unmodified packets. With network coding, instead, intermediate nodes are allowed to forward linear combinations of received packets. Original data can be reconstructed after collecting sufficiently many...
Based on the Ethernet and Bluetooth wireless technology, an improved Bluetooth Ad Hoc network structure, WBPAN(Wireless Bluetooth Personal Area Network) is proposed for the streaming media distribution. In WBPAN, each Bluetooth AP acts as the root of the Bluetree and connects with the nearby Bluetooth devices by the modified BlueTree formation algorithm. In WBPAN, we propose the layered and scalable...
Current day Internet is vulnerable to a variety of attacks during routing between Autonomous Systems (ASes). Routing between ASes in the internet is taken care of by standard de-facto inter-domain protocol called Border Gateway Protocol (BGP). BGP generally performs the hearsay technique for propagating the route for an IP prefix. Each BGP speaker advertises the AS -PATH through UPDATE messages for...
Today, peer-to-peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g. privacy leaks, unpredictable availability, etc. In...
In this paper, we propose PowerDHT, a novel scheme to extend the classic DHT-based overlay to a network with scale free-like properties. PowerDHT has a distributed rewiring method to improve the structure of the overlay network to a power-law-like graph. Our scheme is characterized through minimal, typically local-only, changes. Through simulations, we show that our proposal constructs an overlay...
It generally utilized either peer-to-peer overlay network or server clusters to offer wide area network storage service. These network storage systems suffered from performance penalties or single-point failure. This paper proposed a network storage structure which combines regular graph with distributed hash table, and presented corresponding data accessing methods. The results of simulation demonstrated...
With the growth of decentralized network users, preserving privacy becomes a critical issue in this open community. Kad-based network, as a typical decentralized system, has been widely used nowadays. However, there is not enough research to achieve anonymity on it. In this paper, we propose an anonymous protocol based on Kad network, named Anonymous Kad (A-Kad), which achieves complete privacy and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.