首页 | 官方网站   微博 | 高级检索  
     

SSDHT:基于社交网络的DHT安全增强机制
引用本文:李攀攀,谢正霞,乐光学,马柏林,陈丽,刘建华.SSDHT:基于社交网络的DHT安全增强机制[J].电信科学,2018,34(11):10-20.
作者姓名:李攀攀  谢正霞  乐光学  马柏林  陈丽  刘建华
作者单位:1. 嘉兴学院数理与信息工程学院,浙江 嘉兴 314001;2. 嘉兴学院建筑工程学院,浙江 嘉兴 314001;3. 上海师范大学信息与机电工程学院,上海 200234;4. 绍兴文理学院计算机科学与工程系,浙江 绍兴 312000
基金项目:国家自然科学基金资助项目(61572014);浙江省自然科学基金资助项目(LY16F020028);浙江省自然科学基金资助项目(LY15F020040)
摘    要:P2P系统在文件共享等领域中得到了广泛的应用,但DHT(distributed hash table)网络无中心、无认证、缺乏节点身份验证机制,使得现有的基于DHT的P2P系统易受到Sybil攻击等外部攻击。提出一种基于社交网络的DHT安全增强机制,将社交网络中节点的信任关系引入DHT网络中提高对Sybil节点的识别能力。以KAD(Kademlia)算法为例进行了实验验证,基于Facebook和Twitter数据集的实验结果表明本文提出的安全机制适用于大规模动态的网络,能够有效防御Sybil攻击。

关 键 词:P2P  DHT  社交网络  Sybil攻击  

SSDHT:social network-based secure DHT mechanism
Panpan LI,Zhengxia XIE,Guangxue YUE,Bolin MA,Li CHEN,Jianhua LIU.SSDHT:social network-based secure DHT mechanism[J].Telecommunications Science,2018,34(11):10-20.
Authors:Panpan LI  Zhengxia XIE  Guangxue YUE  Bolin MA  Li CHEN  Jianhua LIU
Affiliation:1. College of Mathematics and Information and Engineering,Jiaxing University,Jiaxing 314001,China;2. College of CML Engineering and Architecture,Jiaxing University,Jiaxing 314001,China;3. College of Information,Mechanical and Electrical Engineering,Shanghai Normal University,Shanghai 200234,China;4. Department of Computer Science and Engineering,Shaoxing University,Shaoxing 312000,China
Abstract:P2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external attacks such as Sybil attacks.A DHT security enhancement mechanism based on social network was proposed,which introduced the trust relationship of nodes in the social network into the DHT network to improve the recognition ability of Sybil nodes.The KAD (Kademlia) algorithm was used as an example to verify the experiment.Experimental results based on Facebook and Twitter datasets show that the proposed security mechanism is suitable for large-scale dynamic networks and can effectively defend against Sybil attacks.
Keywords:P2P  distributed hash table  social network  Sybil attack  
点击此处可从《电信科学》浏览原始摘要信息
点击此处可从《电信科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号