ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Security in Distributed Hash Table in Peer to Peer Protocols

Journal: International Journal of Scientific Engineering and Research (IJSER) (Vol.1, No. 1)

Publication Date:

Authors : ; ;

Page : 124-127

Keywords : distributed hash tables; DHT; security; Sybil attack; peer -to- peer;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Currently Distributed Hash Tables (DHTs) have a significant role in Internet and peer-to-peer protocols. However, DHTs also contain a number of security issues. This paper provides an overview of security research in context of DHTs from methodological point of view. We discuss about security issues and techniques in DHTs but the main focus is in research methods. Also, high-level model is presented to describe the research process in our context.

Last modified: 2021-07-08 15:00:48