2017 International Conference on Computing, Networking and Communications (ICNC) 2017
DOI: 10.1109/iccnc.2017.7876253
|View full text |Cite
|
Sign up to set email alerts
|

Moving peers in distributed, location-based peer-to-peer overlays

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…Several theories have been taken into consideration for the systematic development of overlays with desired properties such as locality awareness, anonymity, mobility and other features [77]. Examples include Geodemlia [78] and LobSter [79] which are location-aware overlays, FRoDO [80] which supports anonymous communications.…”
Section: Other Overlay Considerationsmentioning
confidence: 99%
“…Several theories have been taken into consideration for the systematic development of overlays with desired properties such as locality awareness, anonymity, mobility and other features [77]. Examples include Geodemlia [78] and LobSter [79] which are location-aware overlays, FRoDO [80] which supports anonymous communications.…”
Section: Other Overlay Considerationsmentioning
confidence: 99%
“…4) Other overlay considerations: Several theories have been taken into consideration for the systematic development of overlays with desired properties such as locality awareness, anonymity, mobility and other features [103]. Examples include Geodemlia [104] and LobSter [105] which are location-aware overlays, FRoDO [106] which supports anonymous communications.…”
Section: A Overlay Structuresmentioning
confidence: 99%
“…This is, for example, shown by the following: a recent work that uses Chord in large scaled P2P networks in conjunction with a dynamic trust computing model [19], as well as recent studies on the further improvement of Chord inherent efficiency [20] and correctness [21], or on the joining time of Chord nodes through the usage of anchor peers in an educational scenario [22]. Further recent contributions have concerned the usage of Chord in mobile networks [23] and for location-based services [24]; therefore, Chord's security and reliability are still important aspects to be carefully assessed and studied. Some solutions for improving Chord's security are already present in the relevant literature, such as [25] where the authors deploy certificates and signatures.…”
Section: Background and Related Workmentioning
confidence: 99%