A Resilient P2P Anonymous Routing Approach Employing Collaboration Scheme

نویسندگان

  • Junzhou Luo
  • Xiaogang Wang
  • Ming Yang
چکیده

Node churn is a hindrance to construction of P2P-based anonymous networks, which makes anonymous paths fragile and results in message losses and communication failures. A collaboration scheme combining Friendly Neighbor-based Incentive (FNI) and Re-encryption mechanism is proposed to deal with the high node churn characteristic of P2P networks. The FNI mechanism encourages peers to forward other peers’ messages, and establishes more connections to improve the performance of P2P networks, where only stable and well-behaved nodes can be chosen as relay nodes to improve the durability of anonymous paths. The Reencryption mechanism is designed to replace those failed relay nodes and achieve routing resilience upon different node availabilities in real-world systems. The results from security analysis and simulation show that the P2P anonymous routing approach employing collaboration scheme significantly improves routing resilience and maintains low latency and modest communication overhead.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Protocol for Peer-Peer System to Provide Anonymity

Peer-to-peer (P2P) systems can be used to share files, telephony, discussion forms, and streaming media. In Anonymity Peer-to-Peer (P2P) networks, many systems try to mask the identities of their users for privacy considerations. Existing anonymity approaches like Onion routing, Tor, Crowd are mainly path-based: peers have to pre-construct an anonymous path before transmission. If any peer leav...

متن کامل

SurePath: An Approach to Resilient Anonymous Routing

Current anonymous systems either use a small, fixed core set of mixes or randomly choose a sequence of peer nodes to form anonymous paths/tunnels. The resulting paths are fragile and shortlived — that is, a path fails if one of the mixes/nodes fails or leaves the system. In this paper, we propose SurePath, a failure-resilient tunneling approach for anonymity built on distributed hash tables (DH...

متن کامل

JXTA Performance Model

Project JXTA is an open-source effort to formulate and implement the core peer-to-peer (p2p) computation and collaboration protocols. A JXTA peer network is a complex overlay, constructed on top of the physical network, with its own identification scheme and routing. This paper reviews the performance of JXTA networks using benchmarking. The two major versions of the JXTA protocol implementatio...

متن کامل

ISP-aided neighbour selection in peer-to-peer systems

Peer-to-peer (P2P) systems account for more than half of Internet traffic today, and an increasing number of user applications, e.g., Bittorrent, eDonkey, Joost, Skype, GoogleTalk, and P2P-TV, rely on P2P methodology. P2P systems build overlays at the application layer, independently of Internet routing and ISP topologies. This leads to measurement traffic overhead and routing inefficiencies fo...

متن کامل

A Cross-Layer Design for Wireless Ad-Hoc Peer-to-Peer Live Multimedia Streaming

Establishing peer-to-peer (P2P) live streaming for mobile ad hoc network (MANET) requires an efficient scheme to deliver the realtime data in the infrastructure-less disaster environment. However, P2P membership management is difficult in the dynamic mobility and resource limited MANET. In this paper, we present a cross-layer design for P2PMANET which integrates P2P DHT-based routing protocol a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. UCS

دوره 15  شماره 

صفحات  -

تاریخ انتشار 2009