Enforcing Collaboration in Peer-to-Peer Routing Services

نویسندگان

  • Tim D. Moreton
  • Andrew Twigg
چکیده

Many peer-to-peer services rely on a cooperative model of interaction among nodes, yet actually provide little incentive for nodes to collaborate. In this paper, we develop a trust and security architecture for a routing and node location service based on Kademlia [1], a distributed hash table. Crucially, rather than ‘routing round’ defective or malicious nodes, we discourage free-riding by requiring a node to contribute honestly in order to obtain routing service in return. We claim that our trust protocol enforces collaboration and show how our modified version of Kademlia resists a wide variety of attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enforcing Routing Consistency in Structured Peer-to-Peer Overlays: Should We and Could We?

In this paper, we argue that enforcing routing consistency in keybased routing (KBR) protocols can simplify P2P application design and make structured P2P overlays suitable for more applications. We define two levels of routing consistency semantics, namely weakly consistent KBR and strongly consistent KBR. We focus on an algorithm that provides strong consistency based on group membership serv...

متن کامل

TAC: A Topology-Aware Chord-based Peer-to-Peer Network

Among structured Peer-to-Peer systems, Chord has a general popularity due to its salient features like simplicity, high scalability, small path length with respect to network size, and flexibility on node join and departure. However, Chord doesn’t take into account the topology of underlying physical network when a new node is being added to the system, thus resulting in high routing late...

متن کامل

Group Collaboration, Scaffolding Instruction, and Peer Assessment of Iranian EFL Learners Oral Tasks

Peer assessment has gained growing popularity in education and teaching. Being a learning tool, evaluating their peers can equip learners with skills to develop judgments about what forms high-quality work. There have been however research gaps in the literature showing a lack of adequate work on the investigation of peer assessment in a group-oriented classroom context. The present study inten...

متن کامل

N2N: A Layer Two Peer-to-Peer VPN

The Internet was originally designed as a flat data network delivering a multitude of protocols and services between equal peers. Currently, after an explosive growth fostered by enormous and heterogeneous economic interests, it has become a constrained network severely enforcing client-server communication where addressing plans, packet routing, security policies and users’ reachability are al...

متن کامل

Peer-to-peer SIP-based Services over Wireless Ad Hoc Networks

Session Initiation Protocol (SIP) based services, such as VoIP, Instant Messaging (IM) and Presence, depend on the Internet and SIP overlay infrastructure. Wireless ad hoc networks being devoid of any such infrastructure, require auxiliary mechanisms to support such services. In this paper, we have proposed an integration of the services with a cluster based ad hoc routing protocol and subseque...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003