Abstract
Increasingly on the Internet, applications arc supported by sets of loosely connected machines operating without any form of central coordination and more complex than classical distributed system. Peer-to-peer networking, a disruptive technology for large scale distributed applications, has gained widespread attention due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. Peer-to-peer systems are implemented using an abstract overlay network (An overlay network is a computer network which is built on the top of another network) which makes the P2P system independent from the physical network topology. But current overlays network are not secure; even a small segment of malicious nodes can avoid accurate message delivery throughout the overlay network. This problem is particularly serious in open peer-to-peer systems, where many diverse, sovereign parties without previous trust relationships wish to pool their resources. This paper studies types, categories, characteristics and network applications of peer-to-peer (P2P) overlay networks. Also will review and analyze the type of peer-to- peer (P2P) current security attacks and then will present our Hybrid secure routing mechanism in peer- To- peer overlay networks to overcome the security challenges.
Original language | English |
---|---|
Pages | 26-31 |
Number of pages | 6 |
Publication status | Published - 2012 |
Event | 13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012 - Muscat, Oman Duration: Dec 10 2012 → Dec 12 2012 |
Other
Other | 13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012 |
---|---|
Country/Territory | Oman |
City | Muscat |
Period | 12/10/12 → 12/12/12 |
Keywords
- Overlay networks
- Peer-to-peer
- Security
- Trust
ASJC Scopus subject areas
- Modelling and Simulation