An efficient and secure peer-to-peer overlay network

被引:0
|
作者
Wang, HH [1 ]
Zhu, YW [1 ]
Hu, YM [1 ]
机构
[1] Univ Cincinnati, Dept Elect & Comp Engn, Cincinnati, OH 45221 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of structured P2P overlays exploit Distributed Hash Table (DHT) to achieve an administration-free, fault tolerant overlay network and guarantee to deliver a message to the destination within O(log N) hops. While elegant from a theoretical perspective, those systems face difficulties under an open environment. Not only frequently joining and leaving of nodes generate enormous maintenance overhead, but also various behaviors and resources of peers compromise overlay performance and security. Instead of building P2P overlay from the theoretical view, this paper builds the overlay network from the perspective of the physical network. By combining different network topology-aware techniques, a distinctive overlay network that closely matches the Internet topology is constructed. The P2P system based on this structure is not only highly efficient for routing, but also keeps maintenance overhead very low even under highly dynamic environment. Moreover the system provides a new aspect to solve many security issues.
引用
收藏
页码:764 / 771
页数:8
相关论文
共 50 条
  • [41] An efficient mechanism for mobility support using peer-to-peer overlay networks
    Le, H
    Hoang, D
    Simmonds, A
    Yousef, B
    Chan, J
    [J]. 2005 3RD IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2005, : 325 - 330
  • [42] A Popularity-Aware Semantic Overlay for Efficient Peer-to-Peer Search
    Lee, Choonhwa
    Choi, Junwan
    Kim, Eunsam
    [J]. ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2014, 14 (04) : 105 - 108
  • [43] Constructing efficient peer-to-peer overlay topologies by adaptive connection establishment
    Tian, Huirong
    Zou, Shihong
    Wang, Wendong
    Cheng, Shiduan
    [J]. COMPUTER COMMUNICATIONS, 2006, 29 (17) : 3567 - 3579
  • [44] Efficient Secure Message Routing for Structured Peer-to-Peer Systems
    Xiang, Xu
    Jin, Tan
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 354 - 357
  • [45] Supporting vertical handover by using a Pastry peer-to-peer overlay network
    Hossfeld, T
    Oechsner, S
    Tutschku, K
    Andersen, FU
    Caviglione, L
    [J]. FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 163 - +
  • [46] A Swarm Intelligence Appliance to the Construction of an Intelligent Peer-to-Peer Overlay Network
    Sesum-Cavic, Vesna
    Kuehn, Eva
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2010), 2010, : 1028 - 1035
  • [47] Three-Tier Delaunay Network as a Topology for Peer-to-Peer Overlay
    Fujita, Satoshi
    [J]. JOURNAL OF INTERCONNECTION NETWORKS, 2019, 19 (04)
  • [48] Research on the structure of peer-to-peer overlay based on the complex network theory
    Jiang, Zhiyong
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 1096 - 1099
  • [49] PIPPON: A physical infrastructure-aware peer-to-peer overlay network\
    Hoang, Doan B.
    Le, Hanh
    Simmonds, Andrew
    [J]. TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 23 - +
  • [50] A Markov model for the EpiChord peer-to-peer overlay in an XCAST enabled network
    Kolberg, Mario
    Kolberg, Florence
    Brown, Alan
    Buford, John
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1935 - +