• Title/Summary/Keyword: Distributed Hash Table

Search Result 53, Processing Time 0.024 seconds

Service Discovery Mechanism based on Trustable DHT in MANET (MANET에서 신뢰성 있는 DHT기반의 서비스 발견 기법)

  • Han, In-Sung;Ryou, Hwang-Bin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1947-1954
    • /
    • 2009
  • Service discovery mechanism is a core technique for getting a desired service in MANET(Mobile Ad-Hoc NETwork) environment. However, As feature of MANET, existing mechanisms have some problem that service requester search for trustable service. also it can not support scalability. in this paper, how to reliably support applications such as service discovery on top of MANET. we are firstly finding a trustable service provider and configure DHT(Distributed Hash Table). P2P's DHT can be adopted to service discovery mechanism because P2P and MANET share certain similarities, primarily the fact that both are instances of self-organizing decentralized systems. Especially, Proposed DHT systems used for P2P overlay network can be effective in reducing the communication overhead in service discovery. So proposed mechanism can support for reliably searching required service and scalability. Simulation results show that our mechanism is scalable and outperforms existing service discovery mechanism.

Preventing ID Mapping Attacks on DHT Networks through Non-Voluntary Node Locating (비 자율적 노드 위치 결정을 통한 DHT 네트워크 ID 매핑 공격 방지)

  • Lee, Cheolho;Choi, Kyunghee;Chung, Kihyun;Kim, Jongmyung;Yun, Youngtae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.695-707
    • /
    • 2013
  • DHT(Distributed Hash Table) networks such as Kademlia are vulnerable to the ID mapping attack caused by the voluntary DHT mapping structure where the location of a node is solely determined by itself on the network topology. This causes security problems such as eclipse, DRDoS and botnet C&C on DHT networks. To prevent ID mapping attacks, we propose a non-voluntary DHT mapping scheme and perform analysis on NAT compatibility, attack resistance, and network dynamicity. Analysis results show that our approach may have an equivalent level of attack resistance comparing with other defense mechanisms and overcome their limitations including NAT compatibility and network dynamicity.

Fast Search with Data-Oriented Multi-Index Hashing for Multimedia Data

  • Ma, Yanping;Zou, Hailin;Xie, Hongtao;Su, Qingtang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2599-2613
    • /
    • 2015
  • Multi-index hashing (MIH) is the state-of-the-art method for indexing binary codes, as it di-vides long codes into substrings and builds multiple hash tables. However, MIH is based on the dataset codes uniform distribution assumption, and will lose efficiency in dealing with non-uniformly distributed codes. Besides, there are lots of results sharing the same Hamming distance to a query, which makes the distance measure ambiguous. In this paper, we propose a data-oriented multi-index hashing method (DOMIH). We first compute the covariance ma-trix of bits and learn adaptive projection vector for each binary substring. Instead of using substrings as direct indices into hash tables, we project them with corresponding projection vectors to generate new indices. With adaptive projection, the indices in each hash table are near uniformly distributed. Then with covariance matrix, we propose a ranking method for the binary codes. By assigning different bit-level weights to different bits, the returned bina-ry codes are ranked at a finer-grained binary code level. Experiments conducted on reference large scale datasets show that compared to MIH the time performance of DOMIH can be improved by 36.9%-87.4%, and the search accuracy can be improved by 22.2%. To pinpoint the potential of DOMIH, we further use near-duplicate image retrieval as examples to show the applications and the good performance of our method.

An Efficient Hybrid Lookup Service Exploiting Localized Query Traffic (질의의 지역성을 이용한 효율적인 하이브리드 검색 서비스)

  • Lee, Sang-Hwan;Han, Jae-Il;Kim, Chul-Su;Hwang, Jae-Gak
    • Journal of Information Technology Services
    • /
    • v.8 no.3
    • /
    • pp.171-184
    • /
    • 2009
  • Since the development of the Distributed Hash Tables (DHTs), the distributed lookup services are one of the hot topics in the networking area. The main reason of this popularity is the simplicity of the lookup structure. However, the simple key based search mechanism makes the so called "keyword" based search difficult if not impossible. Thus, the applicability of the DHTs is limited to certain areas. In this paper. we find that DHTs can be used as the ubiquitous sensor network (USN) metadata lookup service across a large number of sensor networks. The popularity of the Ubiquitous Sensor Network has motivated the development of the USN middleware services for the sensor networks. One of the key functionalities of the USN middleware service is the lookup of the USN metadata, by which users get various information about the sensor network such as the type of the sensor networks and/or nodes, the residual of the batteries, the type of the sensor nodes. Traditional distributed hash table based lookup systems are good for one sensor network. However, as the number of sensor network increases, the need to integrate the lookup services of many autonomous sensor networks so that they can provide the users an integrated view of the entire sensor network. In this paper, we provide a hybrid lookup model, in which the autonomous lookup services are combined together and provide seamless services across the boundary of a single lookup services. We show that the hybrid model can provide far better lookup performance than a single lookup system.

Doughnut: An improved P2P Pastry Overlay Network with Efficient Locality and Caching (Doughnut: 효율적인 지역성 및 캐슁을 사용하는 향상된 P2P Pastry 오버레이 네트워크)

  • Kim, Myung-Won;Kwak, Hu-Keun;Chung, Kyu-Sik
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.245-256
    • /
    • 2009
  • Pastry overlay network is one of structured P2Ps using DHT(Distributed Hash Table). To reduce the number of messages among nodes, Rosary and LAR have been proposed by exploiting spatial locality and caching, respectively, in the Pastry. Rosary consists of Inter-Pastry and Intra-Pastry. A root node is assigned as a representative in each Intra-Pastry and it has the responsibility of Inter-Pastry and Intra-Pastry routing. Therefore, Rosary has several disadvantages; 1) low fault tolerance in case of root node failure 2) routing hop count increases because of the use of root nodes compared to the existing structured P2Ps, and 3) the communication load is concentrated in some specific areas. LAR has inefficient problems in that caching is not distributed among nodes in Intra-Pastry and caching is used by only nodes in the Intra-Pastry. In this paper, we propose an improved Pastry called Doughnut to overcome the above problems of Rosary and LAR. By dividing nodes with the local characteristics, the Doughnut consists of Inter-Pastry and Intra-Pastry, and all nodes have the responsibility of Inter-Pastry and Intra-Pastry routing. This results in that all nodes perform the role of the existing root node. This solves the problems of the reducing of fault-tolerance, the increasing of routing hop count, and the not-distributed communication load. Also Doughnut can use cache effectively because it guarantees the even cache distribution in local(Intra-Pastry) and the cache contents in local can be used in the other local. The proposed algorithm is implemented using simulator and the experimental results show the effectiveness of the proposed method compared to the existing method.

A Data Centric Storage based on Adaptive Local Trajectory for Sensor Networks (센서네트워크를 위한 적응적 지역 트라젝토리 기반의 데이터 저장소 기법)

  • Lim, Hwa-Jung;Lee, Joa-Hyoung;Yang, Dong-Il;Tscha, Yeong-Hwan;Lee, Heon-Guil
    • The KIPS Transactions:PartC
    • /
    • v.15C no.1
    • /
    • pp.19-30
    • /
    • 2008
  • Sensor nodes are used as a storage space in the data centric storage method for sensor networks. Sensor nodes save the data to the node which is computed by hash table and users also access to the node to get the data by using hash table. One of the problems which the data centric storage method has is that queries from many users who are interested in the popular data could be concentrated to one node. In this case, responses for queries could be delayed and the energy of heavy loaded node could be dissipated fast. This would lead to reduction of network life time. In this paper, ALT, Data Centric Storage based on Adaptive Local Trajectory, is proposed as scalable data centric storage method for sensor network. ALT constructs trajectory around the storage node. The scope of trajectory is increased or decreased based on the query frequency. ALT distributes the query processing loads to several nodes so that delay of response is reduced and energy dissipation is also distributed.

MicroPost: The Design of an Efficient Event Notification Architecture for Distributed Social Applications (MicroPost: 분산형 소셜 애플리케이션을 위한 효율적인 이벤트 통지 아키텍처의 설계)

  • Bae, Joon-Hyun;Kim, Sang-Wook
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.232-239
    • /
    • 2009
  • Emerging social networking services provide a new paradigm for human-to-human communication. However, these services are centralized and managed by single service provider. In this paper, we propose MicroPost, a decentralized event notification service architecture for social applications based on publish/subscribe model. In our design space, event brokers are structured as an overlay network which provides the substrate of distributed peer-to-peer lookup service for storing and retrieving subscriptions with hashed keys. Event clients interact with event brokers to publish or subscribe social messages over the wide-area network. Using XML standards, we present an efficient algorithm to forward events for rendezvous-based matching in this paper. In our design space, the cost of routing is O(${\omega}log_kN$), where N is the number of event brokers, ${\omega}$ is the number of meta-data obtained from event messages, and k is a constant, which is selected by our design, to divide the identifier space and to conquer the lookup of given key. Consequently, what we achieved is an asynchronous social messaging service architecture which is decentralized, efficient, scalable, and flexible.

  • PDF

R-Tree Construction for The Content Based Publish/Subscribe Service in Peer-to-peer Networks (피어투피어 네트워크에서의 컨텐츠 기반 publish/subscribe 서비스를 위한 R-tree구성)

  • Kim, Yong-Hyuck;Kim, Young-Han;Kang, Nam-Hi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.11
    • /
    • pp.1-11
    • /
    • 2009
  • A content based pub/sub (Publish/subscribe) services at the peer-to-peer network has the requirements about how to distribute contents information of subscriber and to delivery the events efficiently. For satisfying the requirements, a DHT(Distributed Hash Table) based pub/sub overlay networking and tree type topology based network construction using filter technique have been proposed. The DHT based technique is suitable for topic based pub/sub service but it's not good contents based service that has the variable requirements. And also filter based tree topology networking is not efficient at the environment where the user requirements are distributed. In this paper we propose the R-Tree algorithm based pub/sub overlay network construction method. The proposed scheme provides cost effective event delivery method by mapping user requirement to multi-dimension and hierarchical grouping of the requirements. It is verified by simulation at the variable environment of user requirements and events.

Effective Load Balancing through Predicting Load Change in Dynamic Structured P2P Systems (구조화된 동적 P2P시스템에서의 로드 변화 예측을 통한 효율적인 로드 밸런싱)

  • Choi, Yeon-Oh;Song, Jin-Woo;Yang, Sung-Bong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.250-252
    • /
    • 2005
  • 본 논문에서는 분산 해쉬 테이블(Distributed Hash Table)을 이용하는 구조적 P2P(Peer-to-Peer) 시스템에서의 로드 밸런싱 문제를 다룬다. 이러한 환경에서 시스템은 여러 가지 이유로 각 피어들이 서로 다른 부하(load)를 갖는 상황을 맞이하게 된다. P2P 시스템에 오브젝트가 지속적으로 삽입되고 삭제되는 동적인 환경에서 오브젝트의 생존시간을 고려하여 피어가 갖는 로드의 변화를 예측함으로써 불필요한 로드의 이동을 제거하는 효율적인 로드 밸런싱 기법을 제안한다.

  • PDF

Extended Peer-to-Peer Protocol based on IPv6 (IPv6 기반 Peer-to-Peer 확장 프로토콜)

  • 박건우;남민지;조호식;권태경;최양회;유태완;이승윤
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.682-684
    • /
    • 2004
  • IPv4 주소공간의 고갈 문제를 해결하기 위해 많은 사람들은 IPv6의 도입을 추진하고 있다. 따라서 본격적인 보급을 눈앞에 두고 있는 IPv6은 6BONE과 같은 실험망에서 IPv6을 이용하여 개발된 여러 응용프로그램들로 그 성능 및 효용성을 테스트 받고 있다. IPv6 기반 P2P 확장 프로토콜 연구 및 응용 서비스 개발의 일환으로 Distributed Hash Table(DHT)을 이용한 P2P 오버레이 네트워크를 형성하는 툴을 소개한다. 이 툴은 인스턴트 메신저 기능을 함과 동시에 로그인한 사용자 모두를 대상으로 하는 파일 검색 및 공유 기능도 제공한다. 본 논문에서는 P2P 오버레이 네트워크의 구축 과정과 인스턴트 메신저의 친구 목록을 이용한 효과적인 파일 검색 기법을 중점적으로 설명한다.

  • PDF