The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile agents (MA) are autonomous software entities that are able to migrate across heterogeneous network execution environments. Mobility and autonomy compensate the deficiencies of distributed technology pretty well. But the security issues with mobile agents have not been solved and are becoming obstacles for the application of mobile agents. Obfuscation is a technique by applying a behavior transformation...
One of the most critical operations performed in a P2P system is the lookup of a resource. The main issues to be addressed by lookup algorithms are: (1) support for flexible search criteria (e.g., wildcard or multi-keyword searches), (2) effectiveness - i.e., ability to identify all the resources that match the search criteria, (3) efficiency - i.e. low overhead, (4) robustness with respect to node...
P2P networks facilitate people belonging to a community to share resources of interest. However, discovering resources in a large scale P2P network poses a number of challenges. Although distributed hash table (DHT) structured P2P networks have shown enhanced scalability in routing messages, they only support key based exact matches. This paper presents DIndex, a distributed indexing component that...
A broadcast mode may augment peer-to-peer overlay networks with an efficient, scalable data replication function, but may also give rise to a virtual link layer in VPN-type solutions. We introduce a generic, simple broadcasting mechanism that operates in the prefix space of distributed hash tables without signaling. This paper concentrates on the performance analysis of the prefix flooding scheme...
A peer-to-peer (P2P) system has emerged as one of the most successful ways to share resources in distributed environment, and DHT(distributed hash table) is used as an effective approach to locate shared resources in a P2P system. This paper describes an extended DHT model by combining DHT with B+ tree. The sharing resources are represented by their attributes. Each query request is associated with...
This paper presents the design of a highly scalable key-value storage system for building latency sensitive applications. To be able to scale up to an extremely large system, the design adopts a decentralized and symmetrical architecture and uses consistent hashing for partitioning. Every node keeps a full membership of all the nodes in the system and can route a lookup in one hop. Server and network...
Online Social Networks like Facebook, MySpace, Xing, etc. have become extremely popular. Yet they have some limitations that we want to overcome for a next generation of social networks: privacy concerns and requirements of Internet connectivity, both of which are due to web-based applications on a central site whose owner has access to all data. To overcome these limitations, we envision a paradigm...
The very recent demonstration of the SECOQC QKD-network convincingly extended single QKD-links to QKD-networks gaining new functionalities. The needed interfaces, protocols and node modules are explained.
With the rapid development of P2P, there are some new applications such as P2PSIP and intercommunication of heterogeneous DHTs (Distributed Hash Table). In those scenarios, there need some nodes acting as proxies and gateways. Such nodes as proxies or gateways in P2P overlays were called Supernodes. The problem of which nodes would be the supernode s was answered by SN election. To choose an eligible...
Application relay is important for many delay-sensitive applications such as voice over Internet protocol (VoIP). It has been proved that relay selection would be optimized considering autonomous domains (ASes) relationship. We describe a new method for relay selection using service discovery in distributed hash table(DHT) in which relay service advertisements are indexed and clustered according to...
In P2P file-sharing applications, distributed virtual payment mechanism is designed to encourage resource sharing among peers and thus restrain free-riding behaviors. However, it does not provide any protection on the security of the transaction process and the quality of the trading contents. We design a fair transaction mechanism for P2P file-sharing applications, in which a trusted third party...
Peer-to-peer (P2P) architectures have recently become very popular in massively multiplayer games (MMGs). While P2P gaming offers high scalability compared to client/server architectures, it introduces several major issues related to data distribution and game state consistency. In this paper, we report our initial version of VoroGame, a P2P architecture for MMGs that addresses these issues by combining...
Peer-to-peer (P2P) networks are vulnerable to Distributed Denial-of-Service (DDoS) attacks, which cause invalid packets to be flooded through the P2P network, preventing valid packets from being delivered. This causes a disruption of the services provided by the P2P network. Since, anonymity and lack of centralized control/censorship are the salient features of P2P networks; it often encourages malicious...
ULTRA GRIDSEC" is a high performance symmetric key cryptography schema used to increase the performance of symmetric key encryption algorithms like DES and TDES by decreasing their execution time and increasing their security by using compression and multithreading techniques and other enhancement points. In this paper we enhancing the performance of a "ULTRA GRIDSEC" by using a pure...
P2P networks are the most popular network used for data sharing and dissemination of important information. Increasing popularity of P2P networks have exposed number of problems regarding security. These problems also include the problem of finding a trustworthy peer for the dissemination of information. In this paper, a trust management scheme for unstructured P2P networks is proposed that analyzes...
Recent research has shown that small world network (SWN) is navigable. In this position paper, we propose that SWN, for example those which are social networks, have nice properties which make them attractive as overlay networks. Such networks occupy a space between structured and unstructured overlay networks. Our thesis is that SWN may be attractive enough to be a replacement for traditional structured...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.