期刊名称:Oriental Journal of Computer Science and Technology
印刷版ISSN:0974-6471
出版年度:2010
卷号:3
期号:2
页码:349-353
出版社:Oriental Scientific Publishing Company
摘要:Peer-to-peer (P2P) systems are distributed systems in which nodes act as peers, such systemsare becoming very popular in applications like file sharing. In this kind of architecture, security in eachtransaction is fundamental requirements. The aim of a Distributed hash tables provides the method forlocating resources (generally files) within a P2P network. In this paper our target is to analyze therouting attacks on existing protocols of such networks. Chord is preferred as the target DHT protocolfor various causes which will be discussed in the paper. Routing attacks analysis finds the vulnerabilitiesof existing protocols and anticipates a defense mechanism which is discussed herewith
关键词:Routing attacks; peer to peer overlay networks