Science China Information Sciences

, Volume 56, Issue 5, pp 1–14

Secure P2P topology based on a multidimensional DHT space mapping

Authors

    • Key Laboratory of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications)Ministry of Education
    • State Key Laboratory for Novel Software TechnologyNanjing University
  • BingQing Luo
    • Key Laboratory of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications)Ministry of Education
  • YaDang Chen
    • Key Laboratory of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications)Ministry of Education
  • Kai Bu
    • Key Laboratory of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications)Ministry of Education
Research Paper

DOI: 10.1007/s11432-012-4618-3

Cite this article as:
Sun, Z., Luo, B., Chen, Y. et al. Sci. China Inf. Sci. (2013) 56: 1. doi:10.1007/s11432-012-4618-3
  • 111 Views

Abstract

Distributed search and routing algorithms based on the DHT (distributed hash table) protocol have attracted considerable attention in structured P2P (peer-to-peer) research as a result of favorable properties such as distribution, self-organization, and high scalability. Compared with a traditional C/S (client/server) network, the probability of peers initiating malicious behavior increases dramatically because of their self-governing and dynamic characteristics, which also make it harder to satisfy the peers’ security required by DHT. In this paper, we propose a new secure DHT protocol based on a multidimensional mapping mechanism. This mechanism maps peers to a multidimensional space by dividing the identifiers into groups. Moreover, a series of secure methods and routing algorithms are provided to achieve secure DHT in smaller spaces. Compared with state-of-the-art approaches, the theoretical analysis and experimental results show that the multidimensional mapping mechanism can effectively improve the average success rate of a resource search by inhibiting malicious behavior.

Keywords

multidimensionalmappingDHT (distributed hash table)structured P2P (peer-to-peer) networkrouting attacksecurity

Copyright information

© Science China Press and Springer-Verlag Berlin Heidelberg 2012