DOI: 10.1007/978-3-540-79705-0_4
|View full text |Cite
|
Sign up to set email alerts
|

The Exclusion of Malicious Routing Peers in Structured P2P Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…If the next hop is too far away from the finger pointer, the source can infer some ongoing malicious activities. Roh et al use the iterative routing to detect suspicious routing [17]. At each hop, the source node checks if the routing message gets closer to the destination; otherwise a suspicious event is reported.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…If the next hop is too far away from the finger pointer, the source can infer some ongoing malicious activities. Roh et al use the iterative routing to detect suspicious routing [17]. At each hop, the source node checks if the routing message gets closer to the destination; otherwise a suspicious event is reported.…”
Section: Discussionmentioning
confidence: 99%
“…We do not study how to decide the security levels for different servers which should be addressed by application-specific methods orthogonal to CSR, or how to construct the trust model for detection of malicious nodes which has been widely studied in the literature [14], [15], [16], [17], [18], and we assume that there already has been a security hierarchy (e.g., a company's administrative structure). Section 7 will discuss how to incorporate these techniques to CSR.…”
Section: Introductionmentioning
confidence: 99%
“…The P2P routing algorithm is the core of P2P protocol. A robust, efficient and reliable routing algorithm plays a pivotal role in solving problems that P2P network is facing; hence, many research institutions are focused on it Though current attack ways toward the P2P network are numerous (Keith and Minseok, 2009), most of the attacks are against the routing (Stefan and Udo, 2009), which is because the destruction of P2P routing may result in the collapse of the whole P2P network, while the price is very low (BongSoo et al, 2008;Dagon and Zou, 2006). Since the P2P routing mechanism is the key factor to determine the capability of the system against the network attacks, the network stability, the information security and the communication performance.…”
Section: Introductionmentioning
confidence: 99%