Increasingly on the Internet, applications arc supported by sets of loosely connected machines operating without any form of central coordination and more complex than classical distributed system. Peer-to-peer networking, a disruptive technology for large scale distributed applications, has gained widespread attention due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. Peer-to-peer systems are implemented using an abstract overlay network (An overlay network is a computer network which is built on the top of another network) which makes the P2P system independent from the physical network topology. But current overlays network are not secure; even a small segment of malicious nodes can avoid accurate message delivery throughout the overlay network. This problem is particularly serious in open peer-to-peer systems, where many diverse, sovereign parties without previous trust relationships wish to pool their resources. This paper studies types, categories, characteristics and network applications of peer-to-peer (P2P) overlay networks. Also will review and analyze the type of peer-to- peer (P2P) current security attacks and then will present our Hybrid secure routing mechanism in peer- To- peer overlay networks to overcome the security challenges.
|Published - 2012
|13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012 - Muscat, Oman
المدة: ديسمبر ١٠ ٢٠١٢ → ديسمبر ١٢ ٢٠١٢
|13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012
|١٢/١٠/١٢ → ١٢/١٢/١٢
ASJC Scopus subject areas