The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Peer to peer networks are fast becoming the most popular file sharing media, guaranteeing complete user anonymity to the clients. However, modern P2P networks suffer from Sybil attacks, which forge multiple identities to influence the global decisions in the network. This paper suggests a novel solution to minimize Sybils influence using unique combination of Psychometric Tests, Color Tests &...
Research activities have recently begun on the integration of Peer-to-Peer (P2P) principles into the Session Initiation Protocol (SIP). We have contributed to these activities by proposing a P2P SIP architecture where the SIP location service is not managed by the P2P overlay but integrated in proxies that run over peer entities in the P2P overlay. Having SIP proxies as first-class entities, raises...
Peer-to-peer (P2P) network is an alternative of client/server system for sharing resources, e.g. files. P2P network is a robust, distributed and fault tolerant architecture. There are basic two types of P2P networks, structured P2P network and unstructured P2P network. Each of them has its own applications and advantages. Due recent advances in wireless and mobile technology, the P2P network can be...
HAIPE® devices provide encrypted tunneling and transporting services for Internet Protocol (IP) datagrams through an unsecured network on behalf of secure Plain Text (PT) enclaves. Traditionally, secure tunnels were established by manually configuring the local HAIPE with information for peer enclaves. When a large number of enclaves are involved, automation of this configuration process improves...
In recent years, Internet Protocol (IP) telephony is becoming popular because it offers more flexibility in the implementation of new features and services. Session Initiation Protocol (SIP) is a peer-to-peer, multimedia signaling protocol standardized by the Internet Engineering Task Force (IETF) plays a vital role in providing services to IP telephony. SIP is ASCII-based, resembling HTTP, and reuses...
With the success of the peer-to-peer systems, there is an emerging trend to develop an aggregation service that can provide global information about these distributed and decentralized overlays. Existing aggregation protocols have focused on providing an efficient and cost effective solution to compute aggregates. In this paper, we are interested to search the node based on an aggregate query over...
Introducing Peer-to-Peer (P2P) technology into IP Multimedia Subsystem (IMS) is hard but important, especially to the streaming media service. Based on the strength analysis of IMS and P2P, three solutions with the features of signaling centralized and media distributed are compared, and eventually the solution of managing P2P via application server is selected. For the purpose of reusing the public...
In this paper we propose a new architecture for sending, receiving and archiving of multimedia files over 4G MIPV6 network with an effective multiple authentication method. The two modes of mobile multimedia file transfer discussed in this paper are 1) Closed group network suitable for organizations and corporate 2) Peer to peer file transfer between mobile nodes. MIPV6 mobile network enables file...
Search and localization of video is a challenging problem in Peer-to-Peer (P2P) video streaming systems. Traditional approaches have been mainly based on a central server or flooding techniques. We present a decentralized scheme that exploits semantic for unstructured P2P systems. Our semantic approach classifies videos and peers into semantic groups. The proposed scheme uses semantic neighbors to...
Crowds, which is a classical P2P anonymous communication protocol, adopts random forwarding to effectively provide a privacy preserving way of accessing the web with good expansibility, without web sites being able to recognize who is browsing. However, it does not provide anonymity against global eavesdroppers. Furthermore, recipient anonymity and relationship anonymity are not implemented by Crowds...
SIP provides powerful capabilities for building audio conferencing services. However, the scalability for SIP-based telephony systems is mainly limited by both the capability of server and the availability of bandwidth. Based on the study of the SIP and P2P protocol, the paper proposes a pure hierarchical P2P architecture for SIP-based telephony systems. The architecture can dynamically increase the...
There are more and more attacks aiming at P2P network, and those attacks take on sophisticated technology and hidden ways, which bring in serious threat to P2P network. Current countermeasure only copes with one certain kind of P2P attack, and is powerless to other attacks or new emerged attack. We have researched features and effects of main P2P attacks with quantitative analysis method, and have...
It is expected that Peer-to-Peer (P2P) services will co-exist with the client-server based services such as IMS. Mobile users may subscribe to the traditional wireless cellular services while participating in P2P overlay networks. In this paper, a method is proposed to reduce the signaling overhead in a mobile P2P system. With the help of the underlying infrastructure, a mobile device in the P2P overlay...
The following topics are dealt with: performance modelling; routing mechanism; distributed systems; parallel systems; service oriented architecture; communication technology; protocols; autonomic network systems; Internet computing; ad hoc networks; wireless sensor networks; privacy management; mobile networks; multimedia systems; pervasive computing; ubiquitous computing; security intrusion detection;...
We improve Kleinberg's hierarchical small world network model to implement a peer-to-peer overlay network. In the overlay, all the nodes are treated as leaves which are uniformly distributed in a complete 2-ary tree, and the distance between nodes is defined as the height of their lowest common ancestor in the tree. Every node in the overlay is linked to at least one d-distance node if the d-distance...
This paper imports the concept of domain to design a resource locating model with local domain first based on Kademlia protocol, which is abbreviated to LDF-KAD, to refer the small world phenomenon and the characteristic of localized dataflow first on the Internet. The LDF-KAD model includes two layers structure that are super node layer and general layer. And super node layer consists of all super...
While encrypting communication can hide the content of the transaction, the attacker still can invade the users' privacy by flow analysis. Anonymous communication technology is an important method to protect users' privacy. By hiding the participators' identities, or the linkability between sender and receiver, anonymous communication system can guard users' privacy against invasion. The study of...
The Chord is a famous peer-to-peer application. There are many variants which change the structure and the routing algorithm of the Chord, and all these variants achieve the higher routing efficiency than those of the original ones. To improve the routing efficiency of base-k Chord, this paper proposes a new finger table for base-k Chord by using symmetrical bidirectional structure, which just like...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.