• Title/Summary/Keyword: DHT:Distributed, Hash Table

Search Result 42, Processing Time 0.029 seconds

Preventing ID Mapping Attacks on DHT Networks through Non-Voluntary Node Locating (비 자율적 노드 위치 결정을 통한 DHT 네트워크 ID 매핑 공격 방지)

  • Lee, Cheolho;Choi, Kyunghee;Chung, Kihyun;Kim, Jongmyung;Yun, Youngtae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.695-707
    • /
    • 2013
  • DHT(Distributed Hash Table) networks such as Kademlia are vulnerable to the ID mapping attack caused by the voluntary DHT mapping structure where the location of a node is solely determined by itself on the network topology. This causes security problems such as eclipse, DRDoS and botnet C&C on DHT networks. To prevent ID mapping attacks, we propose a non-voluntary DHT mapping scheme and perform analysis on NAT compatibility, attack resistance, and network dynamicity. Analysis results show that our approach may have an equivalent level of attack resistance comparing with other defense mechanisms and overcome their limitations including NAT compatibility and network dynamicity.

Service Discovery Mechanism based on Trustable DHT in MANET (MANET에서 신뢰성 있는 DHT기반의 서비스 발견 기법)

  • Han, In-Sung;Ryou, Hwang-Bin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1947-1954
    • /
    • 2009
  • Service discovery mechanism is a core technique for getting a desired service in MANET(Mobile Ad-Hoc NETwork) environment. However, As feature of MANET, existing mechanisms have some problem that service requester search for trustable service. also it can not support scalability. in this paper, how to reliably support applications such as service discovery on top of MANET. we are firstly finding a trustable service provider and configure DHT(Distributed Hash Table). P2P's DHT can be adopted to service discovery mechanism because P2P and MANET share certain similarities, primarily the fact that both are instances of self-organizing decentralized systems. Especially, Proposed DHT systems used for P2P overlay network can be effective in reducing the communication overhead in service discovery. So proposed mechanism can support for reliably searching required service and scalability. Simulation results show that our mechanism is scalable and outperforms existing service discovery mechanism.

Architecture and Server Selection for DHT-based Distributed CDN (해시 테이블 기반 분산형 CDN 구조 및 서버 선택 방안)

  • Jung, Jong-Hae;Oh, Gun-Young;Lee, Nam-Kyung;Yoon, Chang-Woo;Lee, Hyun-Woo;Ryu, Won;Lee, Sung-Chang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.217-228
    • /
    • 2011
  • In centralize CDN systems, the content server selection is performed by service node for every user request, and the selected node is notified to the user. In this paper, we present distributed CDN architecture and algorithm in which the request from a user is delivered to the content source by a P2P algorithm utilizing DHT(distributed hash table) through the overlay network and the user selects one of the source nodes based on real-time user-centric criteria. For this purpose, we propose a modified Pastry algorithm for contents registration, search and selection, in addition to the distributed architecture. The proposed architecture has the advantages of load balancing, traffic balancing, scalability, fault-tolerance due to the self-configuration, self-healing attributes of distributed architecture. Various simulation shows the feasibility of the proposed architecture and algorithm, and the performance is compared and discussed for the variations of the proposed scheme.

Cloud Assisted P2P Live Video Streaming over DHT Overlay Network (DHT 오버레이 네트워크에서 클라우드 보조의 P2P 라이브 비디오 스트리밍)

  • Lim, Pheng-Un;Choi, Chang-Yeol;Choi, Hwang-Kyu
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.1
    • /
    • pp.89-99
    • /
    • 2017
  • Many works have attempted to solve the scalability, the availability, and the low-latency problems of peer-to-peer (P2P) live video streaming; yet, the problems still remain. While tree-based systems are vulnerable to churn, the mesh-based systems suffer from high delay and overhead. The DHT-aided chunk-driven overlay (DCO) [1] tried to tackle these problems by using the distributed hash table (DHT), which structures into a mesh-based overlay to efficiently share the video segment. However, DCO fully depends on the capacity of the users' device which is small and unstable, i.e., the users' device may leave and join the network anytime, and the video server's bandwidth can be insufficient when the number of users joining the network suddenly increases. Therefore, cloud assist is introduced to overcome those problems. Cloud assist can be used to enhance the availability, the low-latency, and the scalability of the system. In this paper, the DHT is used to maintain the location of the streaming segments in a distributed manner, and the cloud server is used to assist other peers when the bandwidth which required for sharing the video segment is insufficient. The simulation results show that by using the threshold and cloud assist, the availability and the low-latency of the video segments, and the scalability of the network are greatly improved.

Distributed Hash Table based Service Discovery in Mobile Ad Hoc Network (모바일 애드 혹 네트워크에서 분산 해쉬 테이블 기반의 서비스 탐색 기법)

  • Jung, Jae-Hoon;Lee, Seung-Hak;Kim, Nam-Gi;Yoon, Hyn-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.91-97
    • /
    • 2008
  • In order to get a desired service in such environments, we need a service discovery method for discovering a device providing that service. In this paper, we propose a service discovery protocol which is based on DHTs (Distributed Hash Tables) to solve these problems. Our protocol is scalable since it does not require a central lookup server and does not rely on multicast or flooding. Simulation results show that our protocol is scalable and outperforms existing service discovery protocols.

Ultrapeer-based DHT Scheme for Efficient Resources Search (효율적인 자원 탐색을 위한 울트라 피어 기반 DHT 기법)

  • Lee, Ji-Sun;Roh, Sun-Sik;Lee, Dong-Eun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.497-500
    • /
    • 2007
  • 본 논문에서는 p2p 환경에서 울트라피어 기반의 DHT 링을 구성하고 울트라피어에서는 리프피어들이 검색했던 문서들의 메타데이터를 관리함으로써 효율적인 자원검색기법을 제안한다. 울트라피어 기반의 DHT링은 피어들의 참가와 탈퇴가 빈번하게 이루어져서 발생하는 확장성의 문제를 극복하고 울트라 피어가 관리하는 이 메타데이터를 이용하여 자원을 보다 효과적으로 검색할 수 있다.

  • PDF

DHT Algorithm for imploving of Mobile SFA System's performance Based on JXTA (JXTA기반의 모바일 SFA 시스템 성능향상을 위한 DHT 알고리즘 기법)

  • Kim, Hyeong-Gyun;Kim, Yong-Ho;Lee, Sang-Beom
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.137-140
    • /
    • 2005
  • 본 연구에서는 모바일 클라이언트간의 효율적인 데이터 공유를 위해 SFA 서버의 중개 없이, 서버에 접속해 있는 클라이언트간의 데이터 전송이 가능토록 하기 위하여, 기존의 P2P 개념을 모바일 기반으로 확장하였다. 이때 기존의 제한된 메시지 전달방법을 탈피하여 JXTA 기반의 모바일 SFA 시스템을 구축하였다. 본 연구를 통해 개발된 모바일 P2P 서비스와 LBS 기술은, 모바일 사용자 간의 정보 공유가 신속하게 이루어지게 함으로써, 모바일 시스템의 효율성을 향상 시킨다는 점에서 의의를 가진다. 또한 본 논문에서는 플랫폼에 독립적이며, 네트워크 디바이스에 독립적인 환경을 지원하는 JXTA 네트워크 환경에서 분산된 자원을 효율적으로 검색하는 DHT(Distributed Hash Table) 알고리즘을 제안하고자 한다. DHT는 분산 해쉬 테이블을 이용하는 기법으로써, 모든 피어들은 공유하고 있는 자원들에 대한 메타 데이터를 해쉬 값에 의해 지정된 피어에게 전송하며, 메타데이터를 수신한 피어들은 다른 피어로부터 검색 요청이 들어올 경우 자원의 위치를 알려주는 방식으로 동작한다.

  • PDF

Object Replication Methods for High Availability in DHT based P2P Computing System (분산 해쉬 테이블 기반 피어 투 피어 컴퓨팅 시스템에서 가용성 향상 객체 복제 기법)

  • Son, Young-Sung;Jung, Il-Dong;Kim, Kyong-Sok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1535-1543
    • /
    • 2007
  • Recently, there are many researches for P2P network. P2P network technologies are a good solution about making a wide spread distributed computing in the internet environment. The recent algorithms developed by several research groups for the lookup problem present a simple and general interface, a distributed hash table (DHT). In this paper, we also introduce new schemes that enhance the available rate of an object in the MagicSquare network. Replication scheme is to replicate an object with many replicas and save them to several nodes. Fragmentation scheme is to divide an object into several fragments and save them to several nodes. Replicated Fragmentation scheme is to mix replication scheme and fragmentation scheme. We will show result of simulation for our the proposed scheme.

C-Chord: The DHT-based P2P System for the Categorized Search (C-Chord: 분류 검색을 위한 DHT 기반의 P2P 시스템)

  • Kim Sam-Young;Park Jae-Hyun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.343-345
    • /
    • 2005
  • P2P 시스템들의 주요한 이슈는 효율적인 검색 기법에 있다. 기존의 DHT(distributed hash table) 방식의 P2P 시스템들은 단순 쿼리에 이용되는 단일 키워드 일치를 통한 검색 기법에만 머물렀다. 본 논문에서는 이러한 단순 쿼리 기반의 검색 기법을 개선하기 위해 DHT 기반의 도큐먼트 라우팅 모델에서 다중 링 토폴로지를 이용한 분류 탐색 기법을 제안한다. 제안된 기법은 Chord[1] 프로토콜을 기반으로 구현하였으며, 분류 검색의 지원 이후에도 로드 밸런싱에 있어 기존 시스템과 유사한 성능을 보임을 확인한다.

  • PDF

A Geographic Distributed Hash Table for Virtual Geographic Routing in MANET (MANET에서 가상 위치 기반 라우팅을 위한 지역 분산 해쉬 테이블 적용 방법)

  • Ko, Seok-Kap;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.12
    • /
    • pp.58-65
    • /
    • 2008
  • This paper presents a new geographic distributed hash table (GDHT) for MANETs or Mesh networks, where virtual geographic protocol is used. In previous wort GDHT is applied to a network scenario based on two dimensional Cartesian coordinate system. Further, logical data space is supposed to be uniformly distributed. However, mobile node distribution in a network using virtual geographic routing is not matched to data distribution in GDHT. Therefore, if we apply previous GDHT to a virtual geographic routing network, lots of DHT data are probably located at boundary nodes of the network or specific nodes, resulting in long average-delay to discover resource (or service). Additionally, in BVR(Beacon Vector Routing) or LCR(Logical Coordinate Routing), because there is correlation between coordinate elements, we cannot use normal hash function. For this reason, we propose to use "geographic hash function" for GDHT that matches data distribution to node distribution and considers correlation between coordinate elements. We also show that the proposed scheme improves resource discovery efficiently.