Several large scale P2P networks operating on the Internet are based on a Distributed Hash Table. These networks offer valuable services, but they all suffer from a critical issue …
D Germanus, S Roos, T Strufe… - 2014 IEEE conference on …, 2014 - ieeexplore.ieee.org
Peer-to-Peer (P2P) protocols usage is proliferating for a variety of applications including time-and safety-critical ones. While the distributed design of P2P provides inherent fault …
H Salah, T Strufe - 2013 IEEE 33rd International Conference …, 2013 - ieeexplore.ieee.org
Measuring accurate graph snapshots of peer-to-peer (P2P) overlay networks is essential to understand these systems. Furthermore, the captured graph snapshots can be used, among …
The distributed hash table (DHT) formed by BitTorrent has become very popular as a basis for various kinds of services. Services based on this DHT often assume certain …
R Zhang, J Zhang, Y Chen, N Qin… - 30th IEEE …, 2011 - ieeexplore.ieee.org
The security aspect of Distributed Hash Tables (DHT-s), the principal model for structured P2P networks, has received considerable attention from research community, and the …
J Yu, P Xiao, Z Li, Y Zhou - IEEE communications letters, 2010 - ieeexplore.ieee.org
DHTs have been widely used in designing various applications, especially P2P file sharing systems. It is crucial but difficult to get an accurate snapshot of a DHT network, since such …
J Yu, L Lu, P Xiao, Z Li, Y Zhou - Computer Communications, 2011 - Elsevier
Lookup is crucial to locate peers and resources in structured P2P networks. In this paper, we measure and analyze the traffic characteristics of lookup in Kad, which is a widely used DHT …
T Cholez, C Henard, I Chrisment… - 2011 Conference on …, 2011 - ieeexplore.ieee.org
Several large scale P2P networks are based on a distributed hash table. They all suffer from a critical issue allowing malicious nodes to be inserted in specific places on the DHT for …