Efficient Secure Message Routing for Structured Peer-to-Peer Systems

被引:2
|
作者
Xiang, Xu [1 ]
Jin, Tan [1 ]
机构
[1] China Jiliang Univ, Sch Comp Engn, Hangzhou 310018, Peoples R China
关键词
Peer-to-Peer; Structured; Security; Routing;
D O I
10.1109/NSWCTC.2009.124
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In structured P2P systems, peers and keys of content objects are identified using a set of well defined IDs. Queries are routed towards the target with a certain ID. When one ore more nodes are malicious, they may prevent correct message routing. Alternate routing pathes can be used to circumvent them. As a result, the routing latency consists of two parts: normal routing latency and extra routing latency incurred by bypassing malicious nodes. In this paper, we propose tracer routing, an efficient routing strategy designed to control the routing path while reducing the normal routing latency. Combined with a peer-ID based signature scheme, it can offer the initiator of each query to identify malicious nodes. A key feature of our scheme from other protocols is that alternate routing is constructed only detecting malicious nodes. Our simulation show that the routing success rate our scheme can achieve is better than previous protocols.
引用
收藏
页码:354 / 357
页数:4
相关论文
共 50 条
  • [1] Secure routing for structured peer-to-peer overlay networks
    Castro, M
    Druschel, P
    Ganesh, A
    Rowstron, A
    Wallach, DS
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2002, : 299 - 314
  • [2] Efficient Skyline Computation in Structured Peer-to-Peer Systems
    Cui, Bin
    Chen, Lijiang
    Xu, Linhao
    Lu, Hua
    Song, Guojie
    Xu, Quanqing
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2009, 21 (07) : 1059 - 1072
  • [3] Evaluation of secure peer-to-peer overlay routing for survivable SCADA systems
    Farris, JJ
    Nicol, DM
    [J]. PROCEEDINGS OF THE 2004 WINTER SIMULATION CONFERENCE, VOLS 1 AND 2, 2004, : 300 - 308
  • [4] Efficient routing for peer-to-peer overlays
    Gupta, A
    Liskov, B
    Rodrigues, R
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE FIRST SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI'04), 2004, : 113 - 126
  • [5] An Efficient Data Replication Approach for Structured Peer-to-Peer Systems
    Ben Guirat, Fahima
    Filali, Imen
    [J]. 2013 20TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2013,
  • [6] Effective message routing in unstructured peer-to-peer overlays
    Ciglaric, M
    [J]. IEE PROCEEDINGS-COMMUNICATIONS, 2005, 152 (05): : 673 - 678
  • [7] Routing indices for peer-to-peer systems
    Crespo, A
    Garcia-Molina, H
    [J]. 22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 23 - 32
  • [8] On resilience of structured peer-to-peer systems
    Wang, SQ
    Xuan, D
    Zhao, W
    [J]. GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 3851 - 3856
  • [10] An efficient and secure peer-to-peer overlay network
    Wang, HH
    Zhu, YW
    Hu, YM
    [J]. LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2005, : 764 - 771