The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Over the years, peer-to-peer networks have emerged as one of the most popular file sharing medium over The Internet, capable of providing user anonymity to the clients if desired. However, modern P2P networks suffer from the bane of malicious entities we refer to as Sybils, which forge multiple identities to negatively influence or even control the entire network. This paper suggests a novel solution...
Traffic engineering and an economical provisioning of bandwidth is crucial for network providers in times of high competition in broadband access networks. We investigate the efficiency of caching as an option to shorten end-to-end paths and delays while at the same time reducing traffic loads. The portion of HTTP based distribution of cacheable content on the Internet is increasing in recent time...
In Peer-to-Peer (P2P) networks a malicious peer can control the direction of the traffic after it controls lots of bots. This paper focus on defending Distributed Denial of Service (DDoS) attack in P2P networks by selecting the most active peer with its credit values which is recorded in a period of Credit Construction time. The Credit values can be updated in the lest period. We propose Scheduler...
As a means of resources sharing, peer-to-peer (P2P) networks are currently receiving much attention. However, the open and anonymous nature of P2P networks also paves the way for malicious users to abuse the systems such as disseminating of inauthentic files or even viruses. To counter such menacing vulnerabilities in P2P networks, this paper presents a reputation-based approach that combines personal...
Peer-to-peer (p2p) networks have gained immense popularity in recent years and the number of services they provide continuously rises. Where p2p-networks were formerly known as file-sharing networks, p2p is now also used for services like VoIP and IPTV. With so many different p2p applications and services the need for a taxonomy framework rises. This paper describes the available p2p applications...
Peer-to-peer (P2P) networks have attracted more and more attentions in recent years. The access control model is very important for network environment especially for the dynamic networks such as P2P networks. In this paper, a novel time-sensitive access control was proposed for the P2P networks. Firstly, the time point and time span described by the OCL (object constraint language) was introduced...
Despite the popularity of streaming applications over Internet, little is known about its practical properties which could be potentially exploited to guide the system design of next generation peer-to-peer (P2P) networks. In this paper, we hence investigate the problem of understanding and supporting the two types of dominant streaming services - live broadcasting and on-demand streaming - with high...
Peer-to-Peer (P2P) networks have been proposed as one promising approach to provide better scalability for Networked Virtual Environment (NVE) systems, but P2P-NVE also increases the probability of cheating by allowing users to manage the states of objects. In this paper, we propose Delaunay State Management (DSM), a P2P-NVE state management scheme that divides the whole virtual world into many triangular...
Most of the current trust models in peer-to-peer (P2P) networks are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. In addition, the conventional access control mechanism is not suitable because the P2P networks is decentralize and dynamic one. We propose a neighborhood key method, authentication scheme base on zero-knowledge proof...
Resource retrieval is a key element for P2P networks. In this paper we focus on unstructured peer-to-peer networks and present an approach for resources retrieval called DV-Flood. This approach aims to minimize lookup and get delay. The architecture of our proposed model is organized as a several clusters connected through gateways (leader node). Each cluster is represented by a super node (leader)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.