Telecommunications Science ›› 2018, Vol. 34 ›› Issue (11): 10-20.doi: 10.11959/j.issn.1000-0801.2018276

• research and development • Previous Articles     Next Articles

SSDHT:social network-based secure DHT mechanism

Panpan LI1,Zhengxia XIE2,Guangxue YUE1,Bolin MA1,Li CHEN1,Jianhua LIU3,4   

  1. 1 College of Mathematics and Information and Engineering,Jiaxing University,Jiaxing 314001,China
    2 College of CML Engineering and Architecture,Jiaxing University,Jiaxing 314001,China
    3 College of Information,Mechanical and Electrical Engineering,Shanghai Normal University,Shanghai 200234,China
    4 Department of Computer Science and Engineering,Shaoxing University,Shaoxing 312000,China
  • Revised:2018-10-31 Online:2018-11-01 Published:2018-12-06
  • Supported by:
    The National Natural Science Foundation of China(61572014);Zhejiang Provincial Natural Science Foundation of China(LY16F020028);Zhejiang Provincial Natural Science Foundation of China(LY15F020040)

Abstract:

P2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external attacks such as Sybil attacks.A DHT security enhancement mechanism based on social network was proposed,which introduced the trust relationship of nodes in the social network into the DHT network to improve the recognition ability of Sybil nodes.The KAD (Kademlia) algorithm was used as an example to verify the experiment.Experimental results based on Facebook and Twitter datasets show that the proposed security mechanism is suitable for large-scale dynamic networks and can effectively defend against Sybil attacks.

Key words: P2P, distributed hash table, social network, Sybil attack

CLC Number: 

No Suggested Reading articles found!