Structural-based tunneling: preserving mutual anonymity for circular P2P networks
Autor: | Alireza Naghizadeh, R. Ebrahimi Atani, Ehsan Meamari, Samaneh Berenjian |
---|---|
Rok vydání: | 2015 |
Předmět: |
Computer Networks and Communications
Computer science business.industry 020206 networking & telecommunications 02 engineering and technology Overlay Hash table 0202 electrical engineering electronic engineering information engineering 020201 artificial intelligence & image processing Electrical and Electronic Engineering Chord (peer-to-peer) business Anonymity Computer network |
Zdroj: | International Journal of Communication Systems. 29:602-619 |
ISSN: | 1074-5351 |
DOI: | 10.1002/dac.3036 |
Popis: | Many methods are suggested to preserve anonymity of users for peer-to-peer P2P networks. Most of these methods, by relying on established anonymous solutions on client/server applications, are presented for unstructured P2P networks. However, structured overlays, by using distributed hash tables for their routing, do not resemble traditional paradigms. Therefore, current anonymous methods cannot be implemented for them easily. In this paper, we introduce structural-based tunneling SBT to provide mutual anonymity for circular P2P structures. In this method, we get help from inherited features of network infrastructure to establish a standard way for making tunnels. SBT introduces a flexible design that is able to manage different parts of the tunnels on current infrastructures. For this purpose, we incorporate SBT with Chord to show how such design can be managed for real-world applications. The results of applied method with simulations show that by managing critical features of SBT, a trade-off can be made between stronger security and performance of the network. Copyright © 2015 John Wiley & Sons, Ltd. |
Databáze: | OpenAIRE |
Externí odkaz: |