Hub node reinforcement against forwarding obstruction attacks in peer-to-peer networks

Takashi Yajima, Asaki Matsumoto, Hiroshi Shigeno

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

In this paper, Forwarding Obstruction Attack, an attack on overlay networks is focused on, and Hub Node Reinforcement Method to suppress affects of forwarding obstruction is proposed. An inquiry is sent to a randomly selected nodes to receive the number of forwarding search queries. Then the node can know how often it forwards queries in comparison to other nodes. As a result, if the node realizes that it is a Hub node, it expands its routing table. By carrying out the above procedures in a dynamic network, each node determines whether it is a Hub node or not, and decreases the chances of a search query reaching a node which obstructs forwarding. Through computer simulations, the proposed method is compared with no countermeasure and equally reinforced method in the following criteria: search success rate and memory overhead. Compared to the equally reinforced method, the proposed method increases the success search rate by 10% and decreases the memory overhead of the whole network by 30% and shows that the proposed scheme is efficient in the above two criteria.

Original languageEnglish
Title of host publicationProceedings - 2011 International Conference on Network-Based Information Systems, NBiS 2011
Pages388-393
Number of pages6
DOIs
Publication statusPublished - 2011 Nov 9
Event2011 International Conference on Network-Based Information Systems, NBiS 2011 - Tirana, Albania
Duration: 2011 Sep 72011 Sep 9

Publication series

NameProceedings - 2011 International Conference on Network-Based Information Systems, NBiS 2011

Other

Other2011 International Conference on Network-Based Information Systems, NBiS 2011
CountryAlbania
CityTirana
Period11/9/711/9/9

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems

Fingerprint Dive into the research topics of 'Hub node reinforcement against forwarding obstruction attacks in peer-to-peer networks'. Together they form a unique fingerprint.

Cite this