考虑节点拜占庭故障的结构化P2P网络路由协议研究

S. Fukumoto, Tomoki Endo, Mamoru Ohara, M. Arai
{"title":"考虑节点拜占庭故障的结构化P2P网络路由协议研究","authors":"S. Fukumoto, Tomoki Endo, Mamoru Ohara, M. Arai","doi":"10.1109/PRDC.2014.12","DOIUrl":null,"url":null,"abstract":"In this study we discuss fault tolerant routing mechanism for the P2P network, Chord, considering the existence of faulty or malicious nodes. We propose a routing protocol which works despite existence of faulty nodes. We modify the original Chord routing protocol so that it can handle redundant lookups of multiple \"knuckles,\" and replica or data fragments allocation on knuckles. Analysis based on mathematical models and simulations show that the proposed protocol effectively avoids the interruption of object supply caused by the target node fault and/or the acquisition failure of objects caused by malicious nodes tampering.","PeriodicalId":187000,"journal":{"name":"2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Study on Routing Protocol for Structured P2P Network Taking Account of the Nodes Which Behave Like a Byzantine Fault\",\"authors\":\"S. Fukumoto, Tomoki Endo, Mamoru Ohara, M. Arai\",\"doi\":\"10.1109/PRDC.2014.12\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this study we discuss fault tolerant routing mechanism for the P2P network, Chord, considering the existence of faulty or malicious nodes. We propose a routing protocol which works despite existence of faulty nodes. We modify the original Chord routing protocol so that it can handle redundant lookups of multiple \\\"knuckles,\\\" and replica or data fragments allocation on knuckles. Analysis based on mathematical models and simulations show that the proposed protocol effectively avoids the interruption of object supply caused by the target node fault and/or the acquisition failure of objects caused by malicious nodes tampering.\",\"PeriodicalId\":187000,\"journal\":{\"name\":\"2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PRDC.2014.12\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PRDC.2014.12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文在考虑故障节点或恶意节点存在的情况下,讨论了P2P网络Chord的容错路由机制。提出了一种即使存在故障节点也能正常工作的路由协议。我们修改了原始的Chord路由协议,以便它可以处理多个“指关节”的冗余查找,以及指关节上的副本或数据片段分配。基于数学模型和仿真的分析表明,该协议有效地避免了目标节点故障导致的对象供应中断和恶意节点篡改导致的对象获取失败。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Study on Routing Protocol for Structured P2P Network Taking Account of the Nodes Which Behave Like a Byzantine Fault
In this study we discuss fault tolerant routing mechanism for the P2P network, Chord, considering the existence of faulty or malicious nodes. We propose a routing protocol which works despite existence of faulty nodes. We modify the original Chord routing protocol so that it can handle redundant lookups of multiple "knuckles," and replica or data fragments allocation on knuckles. Analysis based on mathematical models and simulations show that the proposed protocol effectively avoids the interruption of object supply caused by the target node fault and/or the acquisition failure of objects caused by malicious nodes tampering.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信