Browse > Article
http://dx.doi.org/10.3837/tiis.2016.05.014

A Symmetric Lookup-based Secure P2P Routing Algorithm  

Luo, Bingqing (Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications)
Jin, Yiai (Zhongxing Telecommunication Equipment Corporation)
Luo, Shengmei (Zhongxing Telecommunication Equipment Corporation)
Sun, Zhixin (Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.5, 2016 , pp. 2203-2217 More about this Journal
Abstract
To prevent structured peer to peer (P2P) overlay networksfrom being attacked by malicious nodes, a symmetric lookup-based routing algorithm referred to as Symmetric-Chord is proposed in this paper. The proposed algorithm determines the precision of routing lookup by constructing multiple paths to the destination. The selective routing algorithm is used to acquire information on the neighbors of the root. Authenticity of the root is validated via consistency shown between the information ascertained from the neighbors and information from the yet-to-be-verified root, resulting in greater efficiency of resource lookup. Simulation results demonstrate that Symmetric-Chordhas the capability of detecting malicious nodes both accurately and efficiently, so as to identify which root holds the correct key, and provides an effective approach to the routing security for the P2P overlay network.
Keywords
Symmetric routing lookup; Selective routing; Distributedhash table; P2P;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Chen HW, Ye ZW, "BChord: Bi-directional routing DHT based on chord," in Proc. of the 12th International Conference on Computer Supported Cooperative Work in Design, pp.410-415, April 16-18, 2008. Article (CrossRef Link)
2 Brite Network topology generator [EB/OL]. http://www.csbu.edu/brite/.
3 Xu X., "Providing Efficient Secure DHTs Routing," in Proc. of Computational Intelligence and Security, pp. 510-514, December 11-14, 2009. Article (CrossRef Link)
4 Bender A, Sherwood R, Monner D, "Fighting Spam with the Neighborhood Watch DHT," in Proc. of INFOCOM, pp. 1755-1763, April 19-25, 2009. Article (CrossRef Link)
5 Xu J, Yan J, He L, "CloudSEC: A Cloud Architecture for Composing Collaborative Security Services," in Proc. of IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), pp. 703-711, November 30-December 3, 2010. Article (CrossRef Link)
6 Mishra M, Tripathy S, Peri S., “SEPastry: Security Enhanced Pastry,” Advances in Computing and Information Technology, vol.176, pp. 789-795, July 13-15, 2012. Article (CrossRef Link)
7 Ganguly. A, Boykin. Po, Wolinsky. Di, “Improving peer connectivity in wide-area overlays of virtual workstations,” Cluster computing-the journal of networks software tools and applications, vol. 12, no.2, pp.239-256, June, 2009. Article (CrossRef Link)
8 Zhao B Y, Kubiatowicz J D, Joseph A D., "Tapestry:An infrastructure for fault-tolerant wide-area location and routing," Technical Report ,UCB/CSD-01-1141, 2001.
9 Shen H Y, Xu C Z, “Elastic Routing Table with Provable Performance for Congestion Control in DHT Networks,” IEEE Transactions on Parallel and Distributed Systems, vol.21, no.2, pp.242-256, April, 2010. Article (CrossRef Link)   DOI
10 Sheng W Y, Ranasinghe Q Z., "P2P object tracking in the internet of things," in Proc. of Parallel Processing (ICPP), pp. 502-511, September 13-16, 2011. Article (CrossRef Link)
11 Rowstron A, Druschel P, "Pastry: Scalable, decentraized object location and routing for large-scale peer-to-peer systems," in Proc. of the 18th IFIP/ACM International Conference, pp. 329-350, November 13-18, 2001. Article (CrossRef Link)
12 Stoica I, Morris R., Karger D, “Chord: A scalable peer-to-peer lookup service for internet applications,” ACM SIGCOMM Computer Communication Review, vol.31, no.4, pp.149–160, Octorber, 2001. Article (CrossRef Link)   DOI
13 Ratnasamy S, Francis P, Handley M., “A Scalable Content Addressable Network,” ACM SIGCOMM Computer Communication Review, vol.31, no.4, pp.161-172, Octorber, 2001. Article (CrossRef Link)   DOI
14 Liu Y T, Qiu X F, Ji Y, "A Novel Security Mechanism to Defend Cross-Layer Security Threats in P2P Network," in Proc. of Internet Technology and Applications (iTAP) , pp. 1-4, August 16-18, 2011. Article (CrossRef Link)
15 Zheng L, Zhang H, Han W, et al., “Technologies, applications, and governance in the Internet of Things,” Internet of things-Global technological and societal trends, Vermesan, Ovidiu and Friess, Peter, pp:141-175, 2011.
16 Villanueva. R, Villamil. MD, Arnedo M, “Secure Routing Strategies in DHT-Based Systems,” Data management in grid and peer-to-peer systems, vol.6265, pp. 62-74, 2010. Article (CrossRef Link)