2015
DOI: 10.1109/jsyst.2014.2306147
|View full text |Cite
|
Sign up to set email alerts
|

MR-Chord: Improved Chord Lookup Performance in Structured Mobile P2P Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…This is, for example, shown by the following: a recent work that uses Chord in large scaled P2P networks in conjunction with a dynamic trust computing model [19], as well as recent studies on the further improvement of Chord inherent efficiency [20] and correctness [21], or on the joining time of Chord nodes through the usage of anchor peers in an educational scenario [22]. Further recent contributions have concerned the usage of Chord in mobile networks [23] and for location-based services [24]; therefore, Chord's security and reliability are still important aspects to be carefully assessed and studied. Some solutions for improving Chord's security are already present in the relevant literature, such as [25] where the authors deploy certificates and signatures.…”
Section: Background and Related Workmentioning
confidence: 98%
“…This is, for example, shown by the following: a recent work that uses Chord in large scaled P2P networks in conjunction with a dynamic trust computing model [19], as well as recent studies on the further improvement of Chord inherent efficiency [20] and correctness [21], or on the joining time of Chord nodes through the usage of anchor peers in an educational scenario [22]. Further recent contributions have concerned the usage of Chord in mobile networks [23] and for location-based services [24]; therefore, Chord's security and reliability are still important aspects to be carefully assessed and studied. Some solutions for improving Chord's security are already present in the relevant literature, such as [25] where the authors deploy certificates and signatures.…”
Section: Background and Related Workmentioning
confidence: 98%
“…Random selection of neighbor peers is resulted in lack of conformity to the topology of infrastructure and also imposing traffic in physical network. In addition to this method, torrential publishing remained as an unsolved challenge in this protocol [18], [14].…”
Section: Related Workmentioning
confidence: 99%
“…Consistent hashing has been well used for P2P communication based on DHT [11], chord [12], KAD [13], etc. In terms of nodes allocation in a cloud environment, especially when the load-balancing strategy is taken into account, consistent hashing shows its advantage on hitting probability with uniform distribution.…”
Section: Virtual Partition Consistent Hashingmentioning
confidence: 99%