The Impact of Routing Attacks on Pastry-Based P2P Online Social Networks

被引:0
|
作者
Eichert, Felix A. [1 ]
Monhof, Markus [1 ]
Graffi, Kalman [2 ]
机构
[1] Univ Paderborn, Paderborn, Germany
[2] Univ Dusseldorf, Technol Social Networks, Dusseldorf, Germany
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-Peer (p2p) networks are common in several areas by now. Besides the well-known file sharing platforms, p2p overlays also emerge as a basis for decentralized social networks. In these, the overlay is used as robust storage for several kinds of social information. With gaining relevance, attackers might have an interest in tampering the functionality of the overlay. In this paper we investigate the routing attacks on the distributed hash table Pastry that we use as basis in our p2p social network LifeSocial. We determine through simulations the impact of routing attacks on the performance of the overlay.
引用
收藏
页码:347 / 358
页数:12
相关论文
共 50 条
  • [1] Implementation of Pastry-based P2P system to share sensor data
    Seok, Seung-Joon
    Song, Wang-Cheol
    Choi, Deokjai
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2010, 8 (3-4) : 125 - 135
  • [2] Evaluation of a Pastry-based P2P Overlay for Supporting Vertical Handover
    Hossfeld, Tobias
    Oechsner, Simon
    Tutschku, Kurt
    Andersen, Frank-Uwe
    [J]. 2006 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2006), VOLS 1-4, 2006, : 2291 - 2296
  • [3] Investigation of Effects of Spoofing Attacks in P2P Online Social Networks
    de Asis Lopez-Fuentes, Francisco
    Balleza-Gallegos, Salvador
    [J]. IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016), 2016, : 199 - 203
  • [4] Evaluating Sybil Attacks in P2P Infrastructures for Online Social Networks
    de Asis Lopez-Fuentes, Francisco
    Balleza-Gallegos, Salvador
    [J]. 2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1262 - 1267
  • [5] Availability in P2P based Online Social Networks
    Shahriar, Nashid
    Chowdhury, Shihabur Rahman
    Ahmed, Reaz
    Sharmin, Mahfuza
    Boutaba, Raouf
    Mathieu, Bertrand
    [J]. PROCEEDINGS OF 2017 4TH INTERNATIONAL CONFERENCE ON NETWORKING, SYSTEMS AND SECURITY (NSYSS), 2017, : 29 - 37
  • [6] SPROUT: P2P routing with social networks
    Marti, S
    Ganesan, P
    Garcia-Molina, H
    [J]. CURRENT TRENDS IN DATABASE TECHNOLOGY - EDBT 2004 WORKSHOPS, PROCEEDINGS, 2004, 3268 : 425 - 435
  • [7] Semantic-based Query Routing in P2P Social Networks
    Yu, Mei
    Wang, Jianrong
    Wang, Qingjie
    Liu, Xuan
    Zhao, Zheng
    Zhang, Yan
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 2, 2010, : 674 - +
  • [8] A social networks routing algorithm of resisting sybil attack based on P2P
    Jia, Xiaoqiang
    [J]. JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2016, 16 (04) : 877 - 898
  • [9] Collaborative Privacy Management in P2P Online Social Networks
    Zahak, Matin
    Alizadeh, Mahdi
    Abbaspour, Maghsoud
    [J]. 2015 12TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2015, : 64 - 72
  • [10] Trust-aware query routing in P2P social networks
    Wang, Qingjie
    Wang, Jianrong
    Yu, Jian
    Yu, Mei
    Zhang, Yan
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (10) : 1260 - 1280