Security in Distributed Hash Table in Peer to Peer Protocols
Journal: International Journal of Scientific Engineering and Research (IJSER) (Vol.1, No. 1)Publication Date: 2013-09-15
Authors : CH. Sushma; D. Navaneetha;
Page : 124-127
Keywords : distributed hash tables; DHT; security; Sybil attack; peer -to- peer;
Abstract
Currently Distributed Hash Tables (DHTs) have a significant role in Internet and peer-to-peer protocols. However, DHTs also contain a number of security issues. This paper provides an overview of security research in context of DHTs from methodological point of view. We discuss about security issues and techniques in DHTs but the main focus is in research methods. Also, high-level model is presented to describe the research process in our context.
Other Latest Articles
- Design and Finite Element Analysis of a Stair Case Material Handling System
- An Efficient VLSI Architecture for Lifting Based Discrete Wavelet Transform
- Performance Analysis of AODV, DSR and OLSR in MANET
- Alarm System of Railway Gate Crossing based on GPS and GSM
- Watershed Management in Rural Area ? A Case Study
Last modified: 2021-07-08 15:00:48